Sciweavers

963 search results - page 36 / 193
» Conditional Digital Signatures
Sort
View
INDOCRYPT
2001
Springer
14 years 1 months ago
Mobile Agent Route Protection through Hash-Based Mechanisms
Abstract. One approach to secure mobile agent execution is restricting the agent route to trusted environments. A necessary condition for this approach to be practical is that the ...
Josep Domingo-Ferrer
CN
2008
100views more  CN 2008»
13 years 8 months ago
An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games
In recent years, massively multiplayer online games (MMOGs) have become very popular by providing more entertainment and sociability than single-player games. In order to prevent c...
Mo-Che Chan, Shun-Yun Hu, Jehn-Ruey Jiang
TRUSTBUS
2005
Springer
14 years 2 months ago
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions
Abstract. Proxy signature schemes allow an original signer to delegate his signing rights to a proxy signer. Most proxy signature schemes have succeeded for proxy delegations and t...
Seung-Hyun Seo, Kyung-Ah Shim, Sang-Ho Lee
FC
2001
Springer
97views Cryptology» more  FC 2001»
14 years 1 months ago
Monotone Signatures
In many real-life situations, massive quantities of signatures have to be issued on cheap passive supports (e.g. paper-based) such as bank-notes, badges, ID cards, driving licenses...
David Naccache, David Pointcheval, Christophe Tyme...
IACR
2011
129views more  IACR 2011»
12 years 8 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter