Sciweavers

488 search results - page 6 / 98
» Policy-Based Cryptography and Applications
Sort
View
EUROCRYPT
2003
Springer
14 years 17 days ago
Concealment and Its Applications to Authenticated Encryption
Yevgeniy Dodis, Jee Hea An
ACSAC
2001
IEEE
13 years 11 months ago
A JCA-Based Implementation Framework for Threshold Cryptography
The Java Cryptography Architecture, JCA in short, was created to allow JCA-compliant cryptography providers to be plugged into a JCA-aware application at run time. This configurab...
Yih Huang, David Rine, Xunhua Wang
SELMAS
2005
Springer
14 years 25 days ago
Policy-Driven Configuration and Management of Agent Based Distributed Systems
In this paper, we demonstrate a policy based approach for building and managing large scale agent based systems. We identify different classes of policies for agent based componen...
Anand R. Tripathi, Devdatta Kulkarni, Tanvir Ahmed
ACNS
2004
Springer
92views Cryptology» more  ACNS 2004»
14 years 23 days ago
Private Keyword-Based Push and Pull with Applications to Anonymous Communication
Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn ...