Sciweavers

380 search results - page 14 / 76
» Time Capsule Signature
Sort
View
CISC
2007
Springer
155views Cryptology» more  CISC 2007»
14 years 11 days ago
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message
Abstract. In this paper, we propose a signcryption scheme which provides all the following properties at the same time. (1) forward security: the private key of a sender does not h...
Raylin Tso, Takeshi Okamoto, Eiji Okamoto
SQJ
2010
112views more  SQJ 2010»
13 years 3 months ago
Improving design-pattern identification: a new approach and an exploratory study
The identification of occurrences of design patterns in programs can help maintainers to understand the program design and implementation. It can also help them to make informed ch...
Yann-Gaël Guéhéneuc, Jean-Yves ...
CSFW
2007
IEEE
14 years 2 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
CCS
2011
ACM
12 years 8 months ago
Televisions, video privacy, and powerline electromagnetic interference
We conduct an extensive study of information leakage over the powerline infrastructure from eight televisions (TVs) spanning multiple makes, models, and underlying technologies. I...
Miro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak...
EUROCRYPT
2007
Springer
14 years 10 days ago
Batch Verification of Short Signatures
Abstract. With computer networks spreading into a variety of new environments, the need to authenticate and secure communication grows. Many of these new environments have particul...
Jan Camenisch, Susan Hohenberger, Michael Ø...