Sciweavers

1094 search results - page 137 / 219
» List signature schemes
Sort
View
AC
1997
Springer
13 years 12 months ago
Cryptographic Primitives for Information Authentication - State of the Art
This paper describes the state of the art for cryptographic primitives that are used for protecting the authenticity of information: cryptographic hash functions and digital signat...
Bart Preneel
IJNSEC
2006
56views more  IJNSEC 2006»
13 years 7 months ago
Traffic Filtering and Routing in Partially-Hidden Networks
Suppose that an organization O wants to do the following: to reveal only part of its network map; to filter unwanted traffic passing through its network; and to route, to the righ...
Deholo Nali, Ali Miri, Carlisle M. Adams
JNW
2008
103views more  JNW 2008»
13 years 7 months ago
Key Revocation System for DNSSEC
Abstract-- The Domain Name System (DNS) is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions...
Gilles Guette
IJNSEC
2010
127views more  IJNSEC 2010»
13 years 2 months ago
A Better Improvement on the Integrated Diffie-Hellman-DSA Key Agreement Protocol
Harn et al. proposed a series of Diffie-Hellman key exchange protocols which are integrated into Digital Signature Algorithm in 2004. Recently, Phan pointed out that Harn et al.&#...
Jie Liu, Jianhua Li
KES
2004
Springer
14 years 1 months ago
Multidimensional Visualization and Navigation in Search Results
Abstract. Search engines traditionally index unstructured text and return ranked lists of documents that match a given query. As search engines functionally move in the direction o...
Will Archer Arentz, Aleksander Øhrn