Sciweavers

985 search results - page 103 / 197
» On the validity of digital signatures
Sort
View
JOC
2007
129views more  JOC 2007»
13 years 10 months ago
Formal Proofs for the Security of Signcryption
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both message confidentiality and unforgeability at a lower computational and communica...
Joonsang Baek, Ron Steinfeld, Yuliang Zheng
JSW
2007
141views more  JSW 2007»
13 years 10 months ago
Building Dependable and Secure Web Services
— Web Services offer great promise for integrating and automating software applications within and between enterprises over the Internet. However, ensuring that Web Services can ...
Louise E. Moser, P. Michael Melliar-Smith, Wenbing...
WAIM
2010
Springer
13 years 8 months ago
Trustworthy Information: Concepts and Mechanisms
We used to treating information received (from recognized sources) as trustworthy, which is unfortunately not true because of attacks. The situation can get worse with the emerging...
Shouhuai Xu, Haifeng Qian, Fengying Wang, Zhenxin ...
ACISP
2010
Springer
13 years 8 months ago
Second-Preimage Analysis of Reduced SHA-1
Many applications using cryptographic hash functions do not require collision resistance, but some kind of preimage resistance. That's also the reason why the widely used SHA-...
Christian Rechberger
ICMCS
2006
IEEE
99views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Classroom Multimedia Integration for Advanced E-Presentations
We have developed several basic components for our Virtualized Classroom project: automated data collection, intelligent media integration, and flexible user interfaces. As an exa...
Weihong Li, Hao Tang, Chad McKittrick, Zhigang Zhu