Sciweavers

1449 search results - page 45 / 290
» Secure and Efficient Metering
Sort
View
ANTS
2006
Springer
101views Algorithms» more  ANTS 2006»
13 years 11 months ago
High Security Pairing-Based Cryptography Revisited
The security and performance of pairing based cryptography has provoked a large volume of research, in part because of the exciting new cryptographic schemes that it underpins. We ...
Robert Granger, Dan Page, Nigel P. Smart
CRITIS
2007
13 years 9 months ago
Modeling and Simulating Information Security Management
Security Management is a complex task. It requires several interconnected activities: designing, implementing and maintaining a robust technical infrastructure, developing suitable...
Jose Maria Sarriegi, Javier Santos, Jose M. Torres...
CRYPTO
2010
Springer
167views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...
Ivan Damgård, Claudio Orlandi
CRYPTO
2010
Springer
181views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions
Due to its universality oblivious transfer (OT) is a primitive of great importance in secure multi-party computation. OT is impossible to implement from scratch in an unconditional...
Severin Winkler, Jürg Wullschleger
ISPEC
2010
Springer
13 years 9 months ago
An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification
Abstract. Undeniable signatures, introduced by Chaum and van Antwerpen, require a verifier to interact with the signer to verify a signature, and hence allow the signer to control ...
Jacob C. N. Schuldt, Kanta Matsuura