Sciweavers

1094 search results - page 108 / 219
» List signature schemes
Sort
View
CISC
2008
Springer
148views Cryptology» more  CISC 2008»
14 years 2 days ago
Publicly Verifiable Privacy-Preserving Group Decryption
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu
CTRSA
2012
Springer
285views Cryptology» more  CTRSA 2012»
12 years 5 months ago
Plaintext-Checkable Encryption
We study the problem of searching on encrypted data, where the search is performed using a plaintext message or a keyword, rather than a message-specific trapdoor as done by state...
Sébastien Canard, Georg Fuchsbauer, Aline G...
COMCOM
2010
129views more  COMCOM 2010»
13 years 10 months ago
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In ord...
Levente Buttyán, László D&oac...
BIOSIG
2010
142views Biometrics» more  BIOSIG 2010»
13 years 8 months ago
Facing the Challenge of Enrolment in National ID Schemes
This article presents the approach followed in the United Arab Emirates (UAE) national ID scheme to register its population for the new smart ID card it launched in 2005. It prese...
Ali M. Al-Khouri
CSIE
2009
IEEE
14 years 4 months ago
An Enhanced-Security Fair E-payment Protocol
Customers are usually passive in an electronic commerce transaction. Based on a new two times concurrent signature, this article presents a fair electronic payment (E-payment) pro...
Wei Fan, Huaying Shu, Elizabeth Fife, Qiang Yan