Sciweavers

1970 search results - page 32 / 394
» Security Without Firewalls
Sort
View
ISCI
2010
105views more  ISCI 2010»
13 years 8 months ago
Secure threshold multi authority attribute based encryption without a central authority
Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao
AINA
2004
IEEE
14 years 1 months ago
Peer-To-Peer Technology for Interconnecting Web Services in Heterogeneous Networks
The interconnection of software components is a key to enabling collaborative work. However, technology differences and security barriers like firewalls often hinder establishing ...
Tim Schattkowsky, Christoph Loeser, Wolfgang M&uum...
PROVSEC
2007
Springer
14 years 3 months ago
Practical Threshold Signatures Without Random Oracles
We propose a secure threshold signature scheme without trusted dealer. Our construction is based on the recently proposed signature scheme of Waters in EUROCRYPT’05. The new thre...
Jin Li, Tsz Hon Yuen, Kwangjo Kim