Sciweavers

401 search results - page 55 / 81
» Delegatable Functional Signatures
Sort
View
ACISICIS
2007
IEEE
14 years 3 months ago
An Efficient and Robust Technique for Region Based Shape Representation and Retrieval
Most region based shape image retrieval techniques in literature are complex to implement. As the result of their complex computations, the retrieval performance of these techniqu...
Dengsheng Zhang, Melissa Chen Yi Lim
CSFW
2007
IEEE
14 years 3 months ago
Computationally Sound Mechanized Proofs of Correspondence Assertions
We present a new mechanized prover for showing correspondence assertions for cryptographic protocols in the computational model. Correspondence assertions are useful in particular...
Bruno Blanchet
GLOBECOM
2006
IEEE
14 years 2 months ago
Bank Transfer over Quantum Channel with Digital Checks
- In recent years, many quantum cryptographic schemes have been proposed. However, it seems that there are many technical difficulties to realize them (except Quantum Key Distribut...
Yoshito Kanamori, Seong-Moo Yoo, Frederick T. Shel...
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
14 years 2 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
MMMACNS
2005
Springer
14 years 2 months ago
Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes
This paper describes a novel approach for preventative protection from both known and previously unknown malicious software. It does not rely on screening the code for signatures ...
Douglas H. Summerville, Victor A. Skormin, Alexand...