Sciweavers

609 search results - page 103 / 122
» Modelling and Checking Timed Authentication of Security Prot...
Sort
View
ISCI
2008
86views more  ISCI 2008»
13 years 9 months ago
New (t, n) threshold directed signature scheme with provable security
Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can v...
Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, X...
MMM
2005
Springer
143views Multimedia» more  MMM 2005»
14 years 2 months ago
Color Time Petri Net for Interactive Adaptive Multimedia Objects
A composite multimedia object (cmo) is comprised of different media components such as text, video, audio and image, with a variety of constraints that must be adhered to. The con...
Ahmed Gomaa, Nabil R. Adam, Vijayalakshmi Atluri
CCS
2003
ACM
14 years 2 months ago
k-anonymous message transmission
Informally, a communication protocol is sender k - anonymous if it can guarantee that an adversary, trying to determine the sender of a particular message, can only narrow down it...
Luis von Ahn, Andrew Bortz, Nicholas J. Hopper
ACNS
2007
Springer
129views Cryptology» more  ACNS 2007»
14 years 3 months ago
Gradually Convertible Undeniable Signatures
In 1990, Boyar, Chaum, Damg˚ard and Pedersen introduced convertible undeniable signatures which limit the self-authenticating property of digital signatures but can be converted b...
Laila El Aimani, Damien Vergnaud
ASIACRYPT
2004
Springer
14 years 2 months ago
Secret Handshakes from CA-Oblivious Encryption
Secret handshakes were recently introduced [BDS+ 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member ca...
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudi...