Sciweavers

1449 search results - page 53 / 290
» Secure and Efficient Metering
Sort
View
EUROCRYPT
2007
Springer
13 years 11 months ago
Revisiting the Efficiency of Malicious Two-Party Computation
In a recent paper Mohassel and Franklin study the efficiency of secure two-party computation in the presence of malicious behavior. Their aim is to make classical solutions to this...
David P. Woodruff
CISC
2009
Springer
199views Cryptology» more  CISC 2009»
13 years 5 months ago
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing
Abstract. Certificateless cryptography introduced by Al-Riyami and Paterson eliminates the key escrow problem inherent in identity based cryptosystems. Even though building practic...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
SP
2000
IEEE
13 years 11 months ago
A More Efficient Use of Delta-CRLs
Delta-certificate revocation lists (delta-CRLs) were designed to provide a more efficient way to distribute certificate status information. However, as this paper shows, in some e...
David A. Cooper
ACSAC
2007
IEEE
13 years 11 months ago
Efficiency Issues of Rete-Based Expert Systems for Misuse Detection
This paper provides a general and comprehensive approach to implementing misuse detection on expert systems and an in-depth analysis of the effectiveness of the optimization strat...
Michael Meier, Ulrich Flegel, Sebastian Schmerl
EUC
2008
Springer
13 years 9 months ago
Efficient Client-to-Client Password Authenticated Key Exchange
With the rapid proliferation of client-to-client applications, PAKE (password authenticated key exchange) protocols in the client-to-client setting become increasingly important. ...
Yanjiang Yang, Feng Bao, Robert H. Deng