Sciweavers

743 search results - page 76 / 149
» Secure Signature Schemes based on Interactive Protocols
Sort
View
WORM
2004
13 years 9 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong
IEICET
2008
119views more  IEICET 2008»
13 years 7 months ago
Universally Composable Identity-Based Encryption
Abstract-- The identity-based encryption (IBE) is one of the most important primitives in cryptography, and various security notions of IBE (e.g., IND-ID-CCA2, NM-ID-CCA2, IND-sID-...
Ryo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto
CIC
2004
13 years 9 months ago
On the Analysis of Packet-Train Probing Schemes
With a better understanding of how probe packets and cross-traffic packets interact with each other, more accurate measurement methods based on active probing can be developed. Sev...
Andreas Johnsson, Bob Melander, Mats Björkman
ISF
2007
84views more  ISF 2007»
13 years 7 months ago
Guided interaction: A mechanism to enable ad hoc service interaction
Ad hoc interaction between web services and their clients is a worthwhile but seemingly distant goal. This paper presents guided interaction as an alternative to the current mecha...
Phillipa Oaks, Arthur H. M. ter Hofstede
IFIP
2009
Springer
13 years 5 months ago
A User Interface for a Game-Based Protocol Verification Tool
We present a platform that allows a protocol researcher to specify the sequence of games from an initial protocol to a protocol where the security property under consideration can ...
Peeter Laud, Ilja Tsahhirov