Sciweavers

763 search results - page 59 / 153
» Digital Signatures Today
Sort
View
FC
2005
Springer
99views Cryptology» more  FC 2005»
14 years 3 months ago
Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling
One of today’s fastest growing crimes is identity theft – the unauthorized use and exploitation of another individual’s identitycorroborating information. It is exacerbated b...
Paul C. van Oorschot, Stuart G. Stubblebine
HCI
2009
13 years 7 months ago
Emergent Design: Serendipity in Digital Educational Games
Using computer games for educational purposes is a fascinating idea that is getting increasingly popular amongst educators, researchers, and developers. From a technical as well as...
Michael D. Kickmeier-Rust, Dietrich Albert
EDBT
2010
ACM
138views Database» more  EDBT 2010»
14 years 2 months ago
How to authenticate graphs without leaking
Secure data sharing in multi-party environments requires that both authenticity and confidentiality of the data be assured. Digital signature schemes are commonly employed for au...
Ashish Kundu, Elisa Bertino
ISW
2001
Springer
14 years 2 months ago
Persistent Authenticated Dictionaries and Their Applications
Abstract. We introduce the notion of persistent authenticated dictionaries, that is, dictionaries where the user can make queries of the type “was element e in set S at time t?...
Aris Anagnostopoulos, Michael T. Goodrich, Roberto...
CRYPTO
1992
Springer
138views Cryptology» more  CRYPTO 1992»
14 years 1 months ago
Designing and Detecting Trapdoors for Discrete Log Cryptosystems
Using a number field sieve, discrete logarithms modulo primes of special forms can be found faster than standard primes. This has raised concerns about trapdoors in discrete log cr...
Daniel M. Gordon