Sciweavers

133 search results - page 18 / 27
» Fair Blind Signatures
Sort
View
PODC
2003
ACM
14 years 23 days ago
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery require that fair exchange be assured. A fair-exchange protocol allo...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
ACSAC
2007
IEEE
14 years 1 months ago
Improving Signature Testing through Dynamic Data Flow Analysis
The effectiveness and precision of network-based intrusion detection signatures can be evaluated either by direct analysis of the signatures (if they are available) or by using bl...
Christopher Kruegel, Davide Balzarotti, William K....
EUROCRYPT
1998
Springer
13 years 11 months ago
Divertible Protocols and Atomic Proxy Cryptography
Abstract. First, we introduce the notion of divertibility as a protocol property as opposed to the existing notion as a language property (see Okamoto, Ohta [OO90]). We give a defi...
Matt Blaze, Gerrit Bleumer, Martin Strauss
ICASSP
2011
IEEE
12 years 11 months ago
MIMO radar for direction finding with exploitation of time-frequency representations
In this paper we consider the exploitation of spatial timefrequency distribution (STFD) in multiple-input multipleoutput (MIMO) radar systems. STFD has been found useful in solvin...
Yimin Zhang, Moeness G. Amin
BIRTHDAY
2012
Springer
12 years 3 months ago
Deniable RSA Signature - The Raise and Fall of Ali Baba
The 40 thieves realize that the fortune in their cave is vanishing. A rumor says that Ali Baba has been granted access (in the form of a certificate) to the cave but they need evi...
Serge Vaudenay