Sciweavers

401 search results - page 66 / 81
» Delegatable Functional Signatures
Sort
View
CIKM
2005
Springer
14 years 29 days ago
Securing XML data in third-party distribution systems
Web-based third-party architectures for data publishing are today receiving growing attention, due to their scalability and the ability to efficiently manage large numbers of use...
Barbara Carminati, Elena Ferrari, Elisa Bertino
AES
2004
Springer
151views Cryptology» more  AES 2004»
14 years 27 days ago
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
This paper is about the design of multivariate public key schemes, as well as block and stream ciphers, in relation to recent attacks that exploit various types of multivariate alg...
Nicolas Courtois
APSEC
2003
IEEE
14 years 24 days ago
Ensuring Compatible Interactions within Component-based Software Systems
The interface definition of a component in a distributed system forms the contract between the component itself and its neighbouring components regarding the use of its services....
Jun Han, Ksze Kae Ker
PPPJ
2003
ACM
14 years 22 days ago
A new approach for implementing stand-alone and Web-based interpreters for Java
Compared to imperative programming languages like Pascal or Basic, or functional programming languages like ML or Haskell learning Java is hampered by the fact that to get even th...
Stephan Diehl, Claudia Bieg
ACISP
2000
Springer
13 years 12 months ago
An Extremely Small and Efficient Identification Scheme
We present a new identification scheme which is based on Legendre symbols modulo a certain hidden prime and which is naturally suited for low power, low memory applications. 1 Ove...
William D. Banks, Daniel Lieman, Igor Shparlinski