Sciweavers

456 search results - page 68 / 92
» Rethinking Digital Signatures
Sort
View
NETWORK
2008
151views more  NETWORK 2008»
15 years 2 months ago
Minimizing information leakage in the DNS
The Domain Name System (DNS) is the global lookup service for network resources. To protect DNS information, the DNS Security Extensions (DNSSEC) have been developed and deployed ...
Scott Rose, Anastase Nakassis
153
Voted
JOC
2007
129views more  JOC 2007»
15 years 2 months ago
Formal Proofs for the Security of Signcryption
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both message confidentiality and unforgeability at a lower computational and communica...
Joonsang Baek, Ron Steinfeld, Yuliang Zheng
122
Voted
JSW
2007
141views more  JSW 2007»
15 years 2 months ago
Building Dependable and Secure Web Services
— Web Services offer great promise for integrating and automating software applications within and between enterprises over the Internet. However, ensuring that Web Services can ...
Louise E. Moser, P. Michael Melliar-Smith, Wenbing...
103
Voted
WAIM
2010
Springer
15 years 26 days ago
Trustworthy Information: Concepts and Mechanisms
We used to treating information received (from recognized sources) as trustworthy, which is unfortunately not true because of attacks. The situation can get worse with the emerging...
Shouhuai Xu, Haifeng Qian, Fengying Wang, Zhenxin ...
130
Voted
ACISP
2010
Springer
15 years 16 days ago
Second-Preimage Analysis of Reduced SHA-1
Many applications using cryptographic hash functions do not require collision resistance, but some kind of preimage resistance. That's also the reason why the widely used SHA-...
Christian Rechberger