Sciweavers

2846 search results - page 118 / 570
» Not one click for security
Sort
View
PKC
2012
Springer
212views Cryptology» more  PKC 2012»
13 years 7 months ago
Security of Blind Signatures Revisited
We revisit the definition of unforgeability of blind signatures as proposed by Pointcheval and Stern (Journal of Cryptology 2000). Surprisingly, we show that this established deļ¬...
Dominique Schröder, Dominique Unruh
PERCOM
2005
ACM
16 years 4 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
15 years 11 months ago
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
Abstract. Fault Analysis is a powerful cryptanalytic technique that enables to break cryptographic implementations embedded in portable devices more efficiently than any other tech...
Matthieu Rivain
ACNS
2005
Springer
97views Cryptology» more  ACNS 2005»
15 years 10 months ago
Quantifying Security in Hybrid Cellular Networks
Abstract. We propose a micro-payment scheme for symmetric multihop cellular networks that encourages intermediaries to transmit packets and recipients to provide auditing informati...
Markus Jakobsson, Liu Yang
ACSC
2006
IEEE
15 years 8 months ago
Tracing secure information flow through mode changes
Communications devices intended for use in securitycritical applications must be rigorously evaluated to ensure they preserve data confidentiality. This process includes tracing t...
Colin J. Fidge, Tim McComb