Sciweavers

1834 search results - page 141 / 367
» Public Key Cryptography
Sort
View
113
Voted
CTRSA
2004
Springer
89views Cryptology» more  CTRSA 2004»
15 years 8 months ago
Universal Re-encryption for Mixnets
We introduce a new cryptographic technique that we call universal re-encryption. A conventional cryptosystem that permits reencryption, such as ElGamal, does so only for a player w...
Philippe Golle, Markus Jakobsson, Ari Juels, Paul ...
121
Voted
FDTC
2008
Springer
144views Cryptology» more  FDTC 2008»
15 years 4 months ago
Comparative Analysis of Robust Fault Attack Resistant Architectures for Public and Private Cryptosystems
The adaptive and active nature of fault based sidechannel attacks along with the large arsenal of fault injection methods complicates the design of effective countermeasures. To o...
Konrad J. Kulikowski, Zhen Wang, Mark G. Karpovsky
134
Voted
WMI
2001
147views more  WMI 2001»
15 years 4 months ago
A wireless public access infrastructure for supporting mobile context-aware IPv6 applications
This paper presents a novel wireless access point architecture designed to support the development of next generation mobile context-aware applications over metropolitan scale are...
Adrian Friday, Maomao Wu, Stefan Schmid, Joe Finne...
125
Voted
CORR
2011
Springer
150views Education» more  CORR 2011»
14 years 9 months ago
XMLlab : multimedia publication of simulations applets using XML and Scilab
We present an XML-based simulation authoring environment. The proposed description language allows to describe mathematical objects such as systems of ordinary differential equat...
Stéphane Mottelet, André Pauss
136
Voted
ESORICS
1998
Springer
15 years 7 months ago
Authentication and Payment in Future Mobile Systems
Abstract. This article presents an efficient public-key protocol for mutual authentication and key exchange designed for third generation mobile communications systems. The paper a...
Günther Horn, Bart Preneel