Sciweavers

1834 search results - page 314 / 367
» Public Key Cryptography
Sort
View
133
Voted
EUROCRYPT
1998
Springer
15 years 7 months ago
A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption
We introduce a new cryptosystem with trapdoor decryption based on the di culty of computing discrete logarithms in the class group of the non-maximal imaginary quadratic order O q ...
Detlef Hühnlein, Michael J. Jacobson Jr., Sac...
142
Voted
COST
2009
Springer
178views Multimedia» more  COST 2009»
15 years 6 months ago
Fusion of Movement Specific Human Identification Experts
Abstract. In this paper a multi-modal method for human identification that exploits the discriminant features derived from several movement types performed from the same human is p...
Nikolaos Gkalelis, Anastasios Tefas, Ioannis Pitas
128
Voted
ECWEB
2007
Springer
155views ECommerce» more  ECWEB 2007»
15 years 6 months ago
A Secure Payment Protocol for Restricted Connectivity Scenarios in M-Commerce
A significant number of mobile payment systems have been proposed in recent years, most of them based on a scenario where all the entities are directly connected one to another (fo...
Jesús Téllez Isaac, José Sier...
127
Voted
PODC
2010
ACM
15 years 6 months ago
Brief announcement: anonymity and trust in distributed systems
In this paper, we present a framework for achieving anonymity and trust, two seemingly contradictory properties, in distributed systems. Our approach builds on webs of trust, a we...
Michael Backes, Stefan Lorenz, Matteo Maffei, Kim ...
130
Voted
EUROCRYPT
2007
Springer
15 years 6 months ago
Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability
Abstract. We introduce a notion of instance-dependent verifiable random functions (InstD-VRFs for short). Informally, an InstD-VRF is, in some sense, a verifiable random function [...
Yi Deng, Dongdai Lin