Sciweavers

2702 search results - page 331 / 541
» Message from the Editor
Sort
View
FM
2006
Springer
153views Formal Methods» more  FM 2006»
15 years 7 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner
CCS
2010
ACM
15 years 4 months ago
Synchronized aggregate signatures: new definitions, constructions and applications
An aggregate signature scheme is a digital signature scheme where anyone given n signatures on n messages from n users can aggregate all these signatures into a single short signa...
Jae Hyun Ahn, Matthew Green, Susan Hohenberger
COMCOM
2008
95views more  COMCOM 2008»
15 years 3 months ago
PFC: A packet forwarding control scheme for vehicle handover over the ITS networks
When a vehicle moves on roads, it can receive messages from base stations (BSs) and other vehicles. After it moves far away the transmission range, the vehicle tries to find an av...
Chung-Ming Huang, Meng-Shu Chiang, Tz-Heng Hsu
INFOCOM
2010
IEEE
15 years 2 months ago
A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping
Abstract—With rising concerns on user privacy over the Internet, anonymous communication systems that hide the identity of a participant from its partner or third parties are hig...
Fengjun Li, Bo Luo, Peng Liu, Chao-Hsien Chu
TMC
2008
159views more  TMC 2008»
15 years 2 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu