Sciweavers

1094 search results - page 119 / 219
» List signature schemes
Sort
View
ADHOC
2008
118views more  ADHOC 2008»
13 years 10 months ago
A localized certificate revocation scheme for mobile ad hoc networks
The issue of certificate revocation in mobile ad hoc networks (MANETs) where there are no on-line access to trusted authorities, is a challenging problem. In wired network environ...
Geneviève Arboit, Claude Crépeau, Ca...
IWDW
2005
Springer
14 years 3 months ago
Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information
In a fingerprinting scheme a distributor places marks in each copy of a digital object. Placing different marks in different copies, uniquely identifies the recipient of each cop...
Miguel Soriano, Marcel Fernandez, Josep Cotrina Na...
ASIACRYPT
2001
Springer
14 years 1 months ago
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
A Zero-knowledge protocol provides provably secure entity authentication based on a hard computational problem. Among many schemes proposed since 1984, the most practical rely on f...
Nicolas Courtois
LOPSTR
1998
Springer
14 years 2 months ago
Inductive Synthesis of Logic Programs by Composition of Combinatory Program Schemes
Based on a variable-free combinatory form of definite clause logic programs we outline a methodology and supporting program environment CombInduce for inducing well-moded logic pro...
Andreas Hamfelt, Jørgen Fischer Nilsson
ACISP
2007
Springer
14 years 4 months ago
Hash-and-Sign with Weak Hashing Made Secure
Abstract. Digital signatures are often proven to be secure in the random oracle model while hash functions deviate more and more from this idealization. Liskov proposed to model a ...
Sylvain Pasini, Serge Vaudenay