Sciweavers

1094 search results - page 52 / 219
» List signature schemes
Sort
View
ICICS
2004
Springer
14 years 3 months ago
Factorization-Based Fail-Stop Signatures Revisited
Fail-stop signature (FSS) schemes are important primitives because in a fail-stop signature scheme the signer is protected against unlimited powerful adversaries as follows: Even i...
Katja Schmidt-Samoa
IJNSEC
2006
80views more  IJNSEC 2006»
13 years 10 months ago
A Forward-Secure User Authentication Scheme with Smart Cards
In 2004, Yoon et al. proposed a user authentication scheme based on generalized ElGamal signature scheme using smart cards. In their scheme, the previous session keys will be comp...
Bin Wang, Zheng-Quan Li
PKC
1999
Springer
142views Cryptology» more  PKC 1999»
14 years 2 months ago
Encrypted Message Authentication by Firewalls
Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant information encapsulated into proto...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
SISW
2005
IEEE
14 years 3 months ago
Lazy Revocation in Cryptographic File Systems
A crucial element of distributed cryptographic file systems are key management solutions that allow for flexible but secure data sharing. We consider efficient key management s...
Michael Backes, Christian Cachin, Alina Oprea
IJSM
2002
95views more  IJSM 2002»
13 years 9 months ago
Metamorphosis of Planar Parametric Curves Via Curvature Interpolation
This work considers the problem of metamorphosis interpolation between two freeform planar curves. Given two planar parametric curves, the curvature signature of the two curves is...
Tatiana Surazhsky, Gershon Elber