Sciweavers

234 search results - page 26 / 47
» Evolving Messaging Systems for Secure Role Based Messaging
Sort
View
CCS
2001
ACM
14 years 9 days ago
Practical forward secure group signature schemes
A group signature scheme allows a group member to sign messages anonymously on behalf of the group, while in case of a dispute, a designated entity can reveal the identity of a si...
Dawn Xiaodong Song
HPCC
2005
Springer
14 years 1 months ago
A SMS Based Ubiquitous Home Care System
In this study, we defined requirements of ubiquitous environment, which users can monitor and control situations of home anytime, anywhere. In addition we developed and built a mod...
Tae-Seok Lee, Yuan Yang, Myong-Soon Park
CRYPTO
1987
Springer
87views Cryptology» more  CRYPTO 1987»
13 years 11 months ago
How to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
Maurice Herlihy, J. D. Tygar
PKC
2012
Springer
212views Cryptology» more  PKC 2012»
11 years 10 months ago
Public-Key Cryptography from New Multivariate Quadratic Assumptions
In this work, we study a new multivariate quadratic (MQ) assumption that can be used to construct public-key encryption schemes. In particular, we research in the following two di...
Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
14 years 8 months ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...