Sciweavers

403 search results - page 31 / 81
» Secure Protocols with Asymmetric Trust
Sort
View
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
14 years 2 months ago
Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions
Abstract. We show a new protocol for blind signatures in which security is preserved even under arbitrarily-many concurrent executions. The protocol can be based on standard crypto...
Carmit Hazay, Jonathan Katz, Chiu-Yuen Koo, Yehuda...
I3E
2001
126views Business» more  I3E 2001»
13 years 9 months ago
Symbolon - A Novel Concept For Secure e-Commerce
Electronic-banking applications (EBAs) are among the pioneers of electroniccommerce (e-commerce) applications. Like other e-commerce applications, they require sophisticated secur...
Sebastian Fischmeister, Günther Hagleitner, W...
ICIW
2007
IEEE
13 years 8 months ago
Analysis of Web Services Secure Conversation with Formal Methods
Web Services Secure Conversation extends Web Services Trust to provide mechanisms for establishing security consecurity context is an abstract concept that refers an authenticated...
M. Llanos Tobarra, Diego Cazorla, Fernando Cuarter...
NDSS
1998
IEEE
14 years 21 days ago
Some Timestamping Protocol Failures
Protocol failures are presented for two timestamping schemes. These failures emphasize the importance and di culty of implementing a secure protocol even though there exist secure...
Mike Just
IACR
2011
147views more  IACR 2011»
12 years 8 months ago
Adaptive Security of Concurrent Non-Malleable Zero-Knowledge
A zero-knowledge protocol allows a prover to convince a verifier of the correctness of a statement without disclosing any other information to the verifier. It is a basic tool a...
Zhenfu Cao, Zongyang Zhang, Yunlei Zhao