Sciweavers

250 search results - page 9 / 50
» Modeling Public Key Infrastructures in the Real World
Sort
View
CMS
2003
120views Communications» more  CMS 2003»
13 years 10 months ago
Extending the SDSI / SPKI Model through Federation Webs
Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...
PROVSEC
2010
Springer
13 years 6 months ago
Identity Based Public Verifiable Signcryption Scheme
Abstract. Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden a...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
ACSAC
2008
IEEE
14 years 3 months ago
A Survey to Guide Group Key Protocol Development
A large number of papers have proposed cryptographic protocols for establishing secure group communication. These protocols allow group members to exchange or establish keys to en...
Ahren Studer, Christina Johns, Jaanus Kase, Kyle O...
SAINT
2003
IEEE
14 years 1 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
COMPSAC
2007
IEEE
14 years 2 months ago
Performance Prediction of Service-Oriented Applications based on an Enterprise Service Bus
An Enterprise Service Bus (ESB) is a standards-based integration platform that combines messaging, web services, data transformation, and intelligent routing in a highly distribut...
Yan Liu, Ian Gorton, Liming Zhu