Sciweavers

743 search results - page 120 / 149
» Secure Signature Schemes based on Interactive Protocols
Sort
View
FC
2000
Springer
127views Cryptology» more  FC 2000»
13 years 11 months ago
Blind, Auditable Membership Proofs
Auditability is an important property in nancial systems and architectures. Here we de ne the primitive of blind auditable membership proof" BAMP which combines public auditab...
Tomas Sander, Amnon Ta-Shma, Moti Yung
CORR
2010
Springer
114views Education» more  CORR 2010»
13 years 7 months ago
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the r...
Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossa...
VTC
2010
IEEE
242views Communications» more  VTC 2010»
13 years 6 months ago
A Cross-Layer Design Based on Geographic Information for Cooperative Wireless Networks
—Most of geographic routing approaches in wireless ad hoc and sensor networks do not take into consideration the medium access control (MAC) and physical layers when designing a ...
Teck Aguilar, Mohamed Chedly Ghedira, Syue-Ju Syue...
OOPSLA
2004
Springer
14 years 28 days ago
Super and inner: together at last!
In an object-oriented language, a derived class may declare a method with the same signature as a method in the base class. The meaning of the re-declaration depends on the langua...
David S. Goldberg, Robert Bruce Findler, Matthew F...
ASIACRYPT
2009
Springer
13 years 11 months ago
Proofs of Storage from Homomorphic Identification Protocols
Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous work has shown that proofs of storage can be constru...
Giuseppe Ateniese, Seny Kamara, Jonathan Katz