Sciweavers

147 search results - page 7 / 30
» Logarithmic keying
Sort
View
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
14 years 1 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
CSJM
2006
114views more  CSJM 2006»
13 years 9 months ago
Cryptoschemes Based on New Signature Formation Mechanism
Several variants of new digital signature schemes (DSS) based on the discrete logarithm and factorization problems have been proposed. Considered DSS are characterized in that a n...
Alexander A. Moldovyan, Dmitriy N. Moldovyan, L. V...
JAT
2010
82views more  JAT 2010»
13 years 8 months ago
The Laguerre-Sobolev-type orthogonal polynomials
In this paper we find the second order linear differential equation satisfied by orthogonal polynomials with respect to the inner product p, q = ∞ 0 p(x)q(x)xα e−x dx + Mp...
Herbert Dueñas, Francisco Marcellán
IJNSEC
2006
107views more  IJNSEC 2006»
13 years 9 months ago
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero know...
Fagen Li, Xiangjun Xin, Yupu Hu
SIGCOMM
1998
ACM
14 years 2 months ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam