Sciweavers

1251 search results - page 92 / 251
» On the security of group communication schemes
Sort
View
ICICS
2001
Springer
14 years 19 days ago
Threshold Undeniable RSA Signature Scheme
Undeniable signature has been extensively researched after Chaum and Antwerpen first proposed the concept of this special digital signature ten years ago. Up to now, however, almo...
Guilin Wang, Sihan Qing, Mingsheng Wang, Zhanfei Z...
AMC
2005
188views more  AMC 2005»
13 years 8 months ago
An efficient signcryption scheme with forward secrecy based on elliptic curve
An efficient signcryption scheme based on elliptic curve is proposed in this paper. The signcryption scheme combines digital signature and encryption functions. The proposed schem...
Ren-Junn Hwang, Chih-Hua Lai, Feng-Fu Su
INDOCRYPT
2010
Springer
13 years 6 months ago
CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public Key
Multivariate Cryptography is one of the alternatives to guarantee the security of communication in the post-quantum world. One major drawback of such schemes is the huge size of th...
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buc...
ITNG
2008
IEEE
14 years 2 months ago
Chord-Based Key Establishment Schemes for Sensor Networks
— Because of limited resources at sensor nodes, sensor networks typically adopt symmetric-key algorithms to provide security functions such as protecting communications between n...
Fan Zhang, Zhijie Jerry Shi, Bing Wang
IFIP
2004
Springer
14 years 1 months ago
An Interactive Trust Management and Negotiation Scheme
Interactive access control allows a server to compute and communicate on the fly the missing credentials to a client and to adapt its responses on the basis of presented and decli...
Hristo Koshutanski, Fabio Massacci