Sciweavers

403 search results - page 36 / 81
» Secure Protocols with Asymmetric Trust
Sort
View
ECR
2006
81views more  ECR 2006»
13 years 8 months ago
Reputation management and signature delegation: A distributed approach
In this paper, we present a novel protocol, called Distributed Signcryption with Verifiable Partial Signature (DiSigncryption) protocol, to allow an agent owner to securely distrib...
Omaima Bamasak, Ning Zhang
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
14 years 2 months ago
The Rigorous Implementation of a Fair Exchange Protocol for Non-repudiable Web Service Interactions - a case study
The correct implementation of security protocols is a challenging task. To achieve a high degree of confidence in an implementation, as with any software, ideally one requires bot...
Nick Cook, Paul Robinson, Santosh K. Shrivastava
PERCOM
2004
ACM
14 years 8 months ago
One-Time Capabilities for Authorizations without Trust
This paper introduces and solves a security problem of pervasive computing: how to define authorizations for offline interactions when trust relationships among entities do not ex...
Laurent Bussard, Refik Molva
IAT
2006
IEEE
14 years 2 months ago
Trust Negotiations with Customizable Anonymity
Trust negotiation makes it possible for two parties to carry on secure transactions by first establishing trust through a bilateral, iterative process of requesting and disclosin...
Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantz...
WECWIS
2003
IEEE
85views ECommerce» more  WECWIS 2003»
14 years 1 months ago
Intermediary Non-repudiation Protocols
In commercial transactions, an intermediary might be involved to help transacting parties to conduct their business. Nevertheless, the intermediary may not be fully trusted. In th...
Jose Antonio Onieva, Jianying Zhou, Mildrey Carbon...