Sciweavers

563 search results - page 54 / 113
» Verifiable Signature Sharing
Sort
View
APLAS
2010
ACM
13 years 9 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
SIGMOD
2002
ACM
147views Database» more  SIGMOD 2002»
14 years 9 months ago
Conceptual Model of Web Service Reputation
Current Web services standards enable publishing service descriptions and finding services on a match based on criteria such as method signatures or service category. However, cur...
E. Michael Maximilien, Munindar P. Singh
EUROCRYPT
2001
Springer
14 years 1 months ago
Lower Bounds for Multicast Message Authentication
Message integrity from one sender to one receiver is typically achieved by having the two parties share a secret key to compute a Message Authentication Code (MAC). We consider the...
Dan Boneh, Glenn Durfee, Matthew K. Franklin
WOWMOM
2000
ACM
87views Multimedia» more  WOWMOM 2000»
14 years 1 months ago
A wireless fair scheduling algorithm for error-prone wireless channels
In order to support relatively differentiated QoS requirement over time-varying shared wireless medium with location-dependent errors, we propose in this paper a Wireless Fair Sche...
P. Lin, Brahim Bensaou, Q. L. Ding, Kee Chaing Chu...
ICIP
2004
IEEE
14 years 10 months ago
Progressive protection of jpeg2000 codestreams
This paper presents an authentication scheme and an access control scheme for JPEG2000 image codestreams based on hash chains. Both schemes are fully compatible with the core part...
Yongdong Wu, Di Ma, Robert H. Deng