Sciweavers

1449 search results - page 174 / 290
» Secure and Efficient Metering
Sort
View
144
Voted
EUROCRYPT
2006
Springer
15 years 8 months ago
Sequential Aggregate Signatures and Multisignatures Without Random Oracles
We present the first aggregate signature, the first multisignature, and the first verifiably encrypted signature provably secure without random oracles. Our constructions derive f...
Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shac...
ACSAC
2001
IEEE
15 years 8 months ago
The Authorization Service of Tivoli Policy Director
This paper presents the Authorization Service provided by Tivoli Policy Director (PD) and its use by PD family members as well as third-party applications. Policies are defined ov...
Günter Karjoth
POPL
2000
ACM
15 years 8 months ago
Generalized Certificate Revocation
We introduce a language for creating and manipulating certificates, that is, digitally signed data based on public key cryptography, and a system for revoking certificates. Our ap...
Carl A. Gunter, Trevor Jim
SAFECOMP
2000
Springer
15 years 8 months ago
Expert Error: The Case of Trouble-Shooting in Electronics
An expert trouble-shooter is a subject who has a great deal of experience in his activity that allows him or her to be very efficient. However, the large amount of problems he or s...
Denis Besnard
159
Voted
ACISP
2010
Springer
15 years 6 months ago
Distinguishers for the Compression Function and Output Transformation of Hamsi-256
Hamsi is one of 14 remaining candidates in NIST's Hash Competition for the future hash standard SHA-3. Until now, little analysis has been published on its resistance to diffe...
Jean-Philippe Aumasson, Emilia Käsper, Lars R...