Sciweavers

2846 search results - page 513 / 570
» Not one click for security
Sort
View
CORR
2007
Springer
122views Education» more  CORR 2007»
15 years 4 months ago
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
Abstract. Identity-based encryption (IBE) schemes are usually used in multiplePKG environments — on the one hand, each administrative domain (e.g., a relatively small and close o...
Shengbao Wang
INFORMATICALT
2006
177views more  INFORMATICALT 2006»
15 years 4 months ago
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys
A convertible authenticated encryption scheme allows a specified recipient to recover and verify a message simultaneously. Moreover the recipient can prove the dishonesty of the se...
Zuhua Shao
JCS
2008
69views more  JCS 2008»
15 years 4 months ago
Non-delegatable authorities in capability systems
We present a novel technique, known as the non-delegatable authority (NDA), for distributing authority to unconfined subjects in capability systems that prevents them from sharing...
Toby C. Murray, Duncan A. Grove
CSDA
2007
120views more  CSDA 2007»
15 years 4 months ago
Boosting ridge regression
Ridge regression is a well established method to shrink regression parameters towards zero, thereby securing existence of estimates. The present paper investigates several approac...
Gerhard Tutz, Harald Binder
JNW
2008
104views more  JNW 2008»
15 years 4 months ago
Fraudulent Internet Banking Payments Prevention using Dynamic Key
As the Internet becoming popular, many sectors such as banking and other financial institutions are adopting e-services and improving their Internet services. However, the e-servic...
Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srin...