Sciweavers

195 search results - page 4 / 39
» E-voting - a Key to Independence for All
Sort
View
CADUI
2004
13 years 9 months ago
The Ubiquitous Interactor - Device Independent Access to Mobile Services
: The Ubiquitous Interactor (UBI) addresses the problems of design and development arising around services that need to be accessed from many different devices. In UBI, the same se...
Stina Nylander, Markus Bylund, Annika Wærn
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
FGCS
2006
101views more  FGCS 2006»
13 years 7 months ago
Evaluating architectures for independently auditing service level agreements
Web and grid services are quickly maturing as a technology that allows for the integration of applications belonging to different administrative domains, enabling much faster and ...
Ana Carolina Barbosa, Jacques Philippe Sauvé...
IJNSEC
2008
124views more  IJNSEC 2008»
13 years 7 months ago
Scalable Delay-constrained Multicast Group Key Management
In the last few years, multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. Some multicast applications requi...
Said Gharout, Yacine Challal, Abdelmadjid Bouabdal...
CRYPTO
2003
Springer
96views Cryptology» more  CRYPTO 2003»
14 years 23 days ago
Scalable Protocols for Authenticated Group Key Exchange
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have bee...
Jonathan Katz, Moti Yung