Sciweavers

1161 search results - page 184 / 233
» Group Message Authentication
Sort
View
MUE
2007
IEEE
104views Multimedia» more  MUE 2007»
14 years 4 months ago
A Conference Key Distribution Scheme Using Interpolating Polynomials
Conference keys are secret keys used by a group of users commonly and with which they can encipher (or decipher) messages such that communications are secure. Based on the Diffie ...
Chin-Chen Chang, Chu-Hsing Lin, Chien-Yuan Chen
ACNS
2007
Springer
129views Cryptology» more  ACNS 2007»
14 years 4 months ago
Gradually Convertible Undeniable Signatures
In 1990, Boyar, Chaum, Damg˚ard and Pedersen introduced convertible undeniable signatures which limit the self-authenticating property of digital signatures but can be converted b...
Laila El Aimani, Damien Vergnaud
ICALP
2007
Springer
14 years 4 months ago
Ring Signatures of Sub-linear Size Without Random Oracles
Ring signatures, introduced by Rivest, Shamir and Tauman, enable a user to sign a message anonymously on behalf of a “ring”. A ring is a group of users, which includes the sign...
Nishanth Chandran, Jens Groth, Amit Sahai
ASWEC
2006
IEEE
14 years 4 months ago
The Transparent Adaptation Approach to the Development of Awareness Mechanisms for Groupware
Implementing support for group awareness is an essential and challenging process in groupware development. This paper reports our research on developing a Transparent Adaptation (...
Minh Hong Tran, Yun Yang, Gitesh K. Raikundalia
ICALT
2006
IEEE
14 years 4 months ago
LIMBS: Open Source, Open Standards, and Open Content To Foster Learning Resource Exchanges
LIMBS is an open source brokerage system developed in the framework of the CALIBRATE project. LIMBS relies on open standards and open contents to promote exchanges of learning res...
Jean-Noel Colin, David Massart