Sciweavers

763 search results - page 70 / 153
» Digital Signatures Today
Sort
View
ESORICS
2009
Springer
14 years 10 months ago
User-Centric Handling of Identity Agent Compromise
Digital identity credentials are a key enabler for important online services, but widespread theft and misuse of such credentials poses serious risks for users. We believe that an ...
Daisuke Mashima, Mustaque Ahamad, Swagath Kannan
WIMOB
2008
IEEE
14 years 4 months ago
On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks
Energy is a central concern in the deployment of wireless sensor networks. In this paper, we investigate the energy cost of cryptographic protocols, both from a communication and ...
Giacomo de Meulenaer, François Gosset, Fran...
COMSWARE
2007
IEEE
14 years 4 months ago
A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks
The Elliptic Curve Digital Signature Algorithm admits a natural parallelization wherein the point multiplication step can be split in two parts and executed in parallel. Further pa...
Sarang Aravamuthan, Viswanatha Rao Thumparthy
HICSS
2007
IEEE
116views Biometrics» more  HICSS 2007»
14 years 4 months ago
Fine-Grained and Scalable Approaches for Message Integrity
When we have multiple users compiling a single message, including shared contents, metadata, policy, and so on, the integrity of the contents created by individual users needs to ...
Joon S. Park, Ganesh Devarajan
PROVSEC
2010
Springer
13 years 7 months ago
Identity Based Public Verifiable Signcryption Scheme
Abstract. Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden a...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...