Sciweavers

1834 search results - page 193 / 367
» Public Key Cryptography
Sort
View
NDSS
2002
IEEE
14 years 2 months ago
Experimenting with Server-Aided Signatures
This paper explores practical and conceptual implications of using Server-Aided Signatures (SAS). SAS is a signature method that relies on partially-trusted servers for generating...
Xuhua Ding, Daniele Mazzocchi, Gene Tsudik
ASIACRYPT
2001
Springer
14 years 1 months ago
How to Achieve a McEliece-Based Digital Signature Scheme
Abstract. McEliece is one of the oldest known public key cryptosystems. Though it was less widely studied than RSA, it is remarkable that all known attacks are still exponential. I...
Nicolas Courtois, Matthieu Finiasz, Nicolas Sendri...
SPW
1997
Springer
14 years 1 months ago
Secure Books: Protecting the Distribution of Knowledge
We undertook a project to secure the distribution of medical information using Wax. This is a proprietary hypertext-based system used for information such as treatment protocols, d...
Ross J. Anderson, Václav Matyás Jr.,...
ICCSA
2007
Springer
14 years 1 months ago
Estimation of TTP Features in Non-repudiation Service
In order to achieve a high performance in a real implementation of the non-repudiation service it is necessary to estimate timeouts, TTP features, publication key time, number of o...
Mildrey Carbonell, José María Sierra...
CMS
2003
120views Communications» more  CMS 2003»
13 years 10 months ago
Extending the SDSI / SPKI Model through Federation Webs
Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...