Sciweavers

4820 search results - page 54 / 964
» Implementing Signatures for C
Sort
View
SP
2009
IEEE
114views Security Privacy» more  SP 2009»
14 years 2 months ago
Formally Certifying the Security of Digital Signature Schemes
We present two machine-checked proofs of the existential unforgeability under adaptive chosen-message attacks of the Full Domain Hash signature scheme. These proofs formalize the ...
Santiago Zanella Béguelin, Gilles Barthe, B...
EUROPKI
2009
Springer
13 years 5 months ago
Validity Models of Electronic Signatures and Their Enforcement in Practice
Abstract. An electronic signature is considered to be valid, if the signature is mathematically correct and if the signer's public key is classified as authentic. While the fi...
Harald Baier, Vangelis Karatsiolis
INFOCOM
2008
IEEE
14 years 2 months ago
Spatial Signatures for Lightweight Security in Wireless Sensor Networks
Abstract— This paper experimentally investigates the feasibility of crypto-free communications in resource-constrained wireless sensor networks. We exploit the spatial signature ...
Lifeng Sang, Anish Arora
RAID
2005
Springer
14 years 1 months ago
Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card
Abstract. CardGuard is a signature detection system for intrusion detection and prevention that scans the entire payload of packets for suspicious patterns and is implemented in so...
Herbert Bos, Kaiming Huang
ECSCW
2007
13 years 9 months ago
Bringing Round-Robin Signature to Computer-Mediated Communication
In computer-mediated group communication, anonymity enables participants to post controversial comments without risking accusations of improper behavior. While this may encourage m...
Takeshi Nishida, Takeo Igarashi