Sciweavers

2715 search results - page 147 / 543
» Database Publication Practices
Sort
View
CORR
2006
Springer
182views Education» more  CORR 2006»
13 years 8 months ago
Cryptanalysis of the CFVZ cryptosystem
The paper analyzes CFVZ, a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the co...
Joan-Josep Climent, E. Gorla, J. Rosenthal
IJNSEC
2008
145views more  IJNSEC 2008»
13 years 8 months ago
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing
Most of the current security architectures for grid systems use conventional public key infrastructure (PKI) to authenticate grid members and to secure resource allocation to thes...
Shengbao Wang, Zhenfu Cao, Haiyong Bao
ISEM
2008
101views more  ISEM 2008»
13 years 8 months ago
Towards decision support for participatory democracy
In many parts of the world there is a growing demand for participation in public policy decision making. This demand could be satisfied by the design and deployment of webbased gr...
David Ríos Insua, Gregory E. Kersten, Jesus...
SOCIALCOM
2010
13 years 6 months ago
q-Anon: Rethinking Anonymity for Social Networks
This paper proposes that social network data should be assumed public but treated private. Assuming this rather confusing requirement means that anonymity models such as kanonymity...
Aaron Beach, Mike Gartrell, Richard Han
CORR
2011
Springer
216views Education» more  CORR 2011»
13 years 3 months ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot