Sciweavers

1769 search results - page 239 / 354
» Cryptography
Sort
View
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
14 years 4 months ago
Generic Security-Amplifying Methods of Ordinary Digital Signatures
We describe two new paradigms on how to obtain ordinary signatures that are secure against existential forgery under adaptively chosen message attacks (fully-secure, in short), fro...
Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 4 months ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
14 years 4 months ago
The Security of EPC Gen2 Compliant RFID Protocols
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard the de facto specification for inexpensive tags in the RFID industry. EPCGen2 supports only very b...
Mike Burmester, Breno de Medeiros
ICC
2007
IEEE
124views Communications» more  ICC 2007»
14 years 4 months ago
Countermeasure Uncooperative Behaviors with Dynamic Trust-Token in VANETs
− As one special case of the Mobile Ad Hoc Networks (MANETs), Vehicular Ad hoc Network (VANET) is featured for its extremely high mobility and constantly changing topology. As a ...
Zhou Wang, Chunxiao Chigan
ICCCN
2007
IEEE
14 years 4 months ago
SCUBE: A DoS-Resistant Distributed Search Protocol
– Many P2P-based storage systems use distributed indexing service for searching documents. There are two security issues when the nodes providing the index service are compromise...
Souvik Ray, Zhao Zhang