Sciweavers

1834 search results - page 141 / 367
» Public Key Cryptography
Sort
View
CTRSA
2004
Springer
89views Cryptology» more  CTRSA 2004»
14 years 3 months ago
Universal Re-encryption for Mixnets
We introduce a new cryptographic technique that we call universal re-encryption. A conventional cryptosystem that permits reencryption, such as ElGamal, does so only for a player w...
Philippe Golle, Markus Jakobsson, Ari Juels, Paul ...
FDTC
2008
Springer
144views Cryptology» more  FDTC 2008»
13 years 11 months ago
Comparative Analysis of Robust Fault Attack Resistant Architectures for Public and Private Cryptosystems
The adaptive and active nature of fault based sidechannel attacks along with the large arsenal of fault injection methods complicates the design of effective countermeasures. To o...
Konrad J. Kulikowski, Zhen Wang, Mark G. Karpovsky
WMI
2001
147views more  WMI 2001»
13 years 11 months ago
A wireless public access infrastructure for supporting mobile context-aware IPv6 applications
This paper presents a novel wireless access point architecture designed to support the development of next generation mobile context-aware applications over metropolitan scale are...
Adrian Friday, Maomao Wu, Stefan Schmid, Joe Finne...
CORR
2011
Springer
150views Education» more  CORR 2011»
13 years 4 months ago
XMLlab : multimedia publication of simulations applets using XML and Scilab
We present an XML-based simulation authoring environment. The proposed description language allows to describe mathematical objects such as systems of ordinary differential equat...
Stéphane Mottelet, André Pauss
ESORICS
1998
Springer
14 years 1 months ago
Authentication and Payment in Future Mobile Systems
Abstract. This article presents an efficient public-key protocol for mutual authentication and key exchange designed for third generation mobile communications systems. The paper a...
Günther Horn, Bart Preneel