Sciweavers

1094 search results - page 60 / 219
» List signature schemes
Sort
View
IMA
2005
Springer
85views Cryptology» more  IMA 2005»
14 years 3 months ago
The Physically Observable Security of Signature Schemes
In recent years much research has been devoted to producing formal models of security for cryptographic primitives and to designing schemes that can be proved secure in such models...
Alexander W. Dent, John Malone-Lee
SP
2007
IEEE
14 years 4 months ago
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing
In this paper, we present ShieldGen, a system for automatically generating a data patch or a vulnerability signature for an unknown vulnerability, given a zero-day attack instance...
Weidong Cui, Marcus Peinado, Helen J. Wang, Michae...
CCR
2000
101views more  CCR 2000»
13 years 9 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
ICDCSW
2008
IEEE
14 years 4 months ago
A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems
Zhong Xu, Xue Liu, Guoqing Zhang, Wenbo He, Guanzh...
INFOCOM
2008
IEEE
14 years 4 months ago
An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks
Zhen Yu, Yawen Wei, Bhuvaneswari Ramkumar, Yong Gu...