Sciweavers

2421 search results - page 106 / 485
» Message from the Editor-in-Chief
Sort
View
FAC
2008
80views more  FAC 2008»
13 years 10 months ago
Verification of Mondex electronic purses with KIV: from transactions to a security protocol
The Mondex case study about the specification and refinement of an electronic purse as defined in the Oxford Technical Monograph PRG-126 has recently been proposed as a challenge f...
Dominik Haneberg, Gerhard Schellhorn, Holger Grand...
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 8 months ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang
CORR
2011
Springer
175views Education» more  CORR 2011»
13 years 2 months ago
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol descripti...
Mihhail Aizatulin, Andrew D. Gordon, Jan Jürj...
PKC
2012
Springer
212views Cryptology» more  PKC 2012»
12 years 20 days ago
Public-Key Cryptography from New Multivariate Quadratic Assumptions
In this work, we study a new multivariate quadratic (MQ) assumption that can be used to construct public-key encryption schemes. In particular, we research in the following two di...
Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang
CHI
2002
ACM
14 years 10 months ago
Observed behavior and perceived value of authors in usenet newsgroups: bridging the gap
In this paper we describe an evaluation of behavioral descriptors generated from an analysis of a large collection of Usenet newsgroup messages. The metrics describe aspects of ne...
Andrew T. Fiore, Scott Lee Tiernan, Marc A. Smith