Sciweavers

5843 search results - page 51 / 1169
» Software Security in Practice
Sort
View
ICYCS
2008
IEEE
14 years 3 months ago
The Practice of Remote Education on Information Security
With the rapid development of computer science, its education mode also changes a lot. Teaching and learning are not restricted by the physical distance with the help of the netwo...
Wei Hu, Gang Wang, Qingsong Shi, Tianzhou Chen
ACSAC
1999
IEEE
14 years 1 months ago
Towards a Practical, Secure, and Very Large Scale Online Election
We propose in this paper a practical and secure electronic voting protocol for large-scale online elections. Our protocol satisfies a large set of important criteria that has neve...
Jared Karro, Jie Wang
DCC
2010
IEEE
13 years 9 months ago
Practical unconditionally secure two-channel message authentication
We investigate unconditional security for message authentication protocols that are designed using two-channel cryptography. We look at both noninteractive message authentication ...
Atefeh Mashatan, Douglas R. Stinson
CTRSA
2007
Springer
111views Cryptology» more  CTRSA 2007»
14 years 3 months ago
A Practical and Tightly Secure Signature Scheme Without Hash Function
In 1999, two signature schemes based on the flexible RSA problem (a.k.a. strong RSA problem) were independently introduced: the Gennaro-Halevi-Rabin (GHR) signature scheme and the...
Benoît Chevallier-Mames, Marc Joye
EUROCRYPT
2000
Springer
14 years 17 days ago
Security Aspects of Practical Quantum Cryptography
The use of quantum bits (qubits) in cryptography holds the promise of secure cryptographic quantum key distribution schemes. Unfortunately, the implemented schemes are often operat...
Gilles Brassard, Norbert Lütkenhaus, Tal Mor,...