Sciweavers

963 search results - page 45 / 193
» Conditional Digital Signatures
Sort
View
FAC
2007
128views more  FAC 2007»
13 years 8 months ago
Verifying a signature architecture: a comparative case study
Abstract. We report on a case study in applying different formal methods to model and verify an architecture for administrating digital signatures. The architecture comprises seve...
David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki...
CSIE
2009
IEEE
14 years 3 months ago
An Enhanced-Security Fair E-payment Protocol
Customers are usually passive in an electronic commerce transaction. Based on a new two times concurrent signature, this article presents a fair electronic payment (E-payment) pro...
Wei Fan, Huaying Shu, Elizabeth Fife, Qiang Yan
INFORMATICALT
2007
100views more  INFORMATICALT 2007»
13 years 8 months ago
On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes
Recently, Chen, Chung, and Huang proposed a traceable proxy multisignature scheme based on the elliptic curve cryptosystem. However, this paper shows that the original signers can ...
Pei-Hui Huang, Hsiang-An Wen, Chih-Hung Wang, Tzon...
CJ
2004
93views more  CJ 2004»
13 years 8 months ago
An Architecture for Kernel-Level Verification of Executables at Run Time
Digital signatures have been proposed by several researchers as a way of preventing execution of malicious code. In this paper we propose a general architecture for performing the...
Luigi Catuogno, Ivan Visconti
PICS
2001
13 years 10 months ago
Diagnostics for Digital Capture Using MTF
The modulation transfer function (MTF) has long been used as a diagnostic tool for analog image capture, by tracking frequency response caused by aperture, field position, or defo...
Don R. Williams, Peter D. Burns