Sciweavers

1282 search results - page 99 / 257
» Signing on signing off
Sort
View
INFORMATICALT
2007
122views more  INFORMATICALT 2007»
13 years 9 months ago
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys
In 2004, Abe et al. proposed a threshold signer-ambiguous signature scheme from variety of keys. Their scheme is a generalized case of the ring signature scheme, and it allows the ...
Ya-Fen Chang, Chin-Chen Chang, Pei-Yu Lin
CIE
2010
Springer
13 years 7 months ago
Proofs, Programs, Processes
Abstract. We study a realisability interpretation for inductive and coinductive definitions and discuss its application to program extraction from proofs. A speciality of this inte...
Ulrich Berger, Monika Seisenberger
PROVSEC
2010
Springer
13 years 7 months ago
Efficient Confirmer Signatures from the "Signature of a Commitment" Paradigm
Generic constructions of designated confirmer signatures follow one of the following two strategies; either produce a digital signature on the message to be signed, then encrypt th...
Laila El Aimani
INFORMATICALT
2010
170views more  INFORMATICALT 2010»
13 years 6 months ago
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original sign...
Hu Xiong, Fagen Li, Zhiguang Qin
WWW
2009
ACM
12 years 5 months ago
The slashdot zoo: mining a social network with negative edges
We analyse the corpus of user relationships of the Slashdot technology news site. The data was collected from the Slashdot Zoo feature where users of the website can tag other user...
J. Kunegis, A. Lomatzsch, and C. Bauckhage