Sciweavers

141 search results - page 11 / 29
» Verifying Generics and Delegates
Sort
View
PKC
2009
Springer
180views Cryptology» more  PKC 2009»
14 years 8 months ago
Security of Sanitizable Signatures Revisited
Sanitizable signature schemes, as defined by Ateniese et al. (ESORICS 2005), allow a signer to partly delegate signing rights to another party, called the sanitizer. That is, the s...
Anja Lehmann, Christina Brzuska, Dominique Schr&ou...
SSD
2009
Springer
142views Database» more  SSD 2009»
14 years 1 months ago
Monitoring Orientation of Moving Objects around Focal Points
Abstract. We consider a setting with numerous location-aware moving objects that communicate with a central server. Assuming a set of focal points of interest, we aim at continuous...
Kostas Patroumpas, Timos K. Sellis
DASFAA
2006
IEEE
134views Database» more  DASFAA 2006»
14 years 1 months ago
Authentication of Outsourced Databases Using Signature Aggregation and Chaining
Database outsourcing is an important emerging trend which involves data owners delegating their data management needs to an external service provider. Since a service provider is a...
Maithili Narasimha, Gene Tsudik
ISSTA
2010
ACM
13 years 11 months ago
N-version disassembly: differential testing of x86 disassemblers
The output of a disassembler is used for many different purposes (e.g., debugging and reverse engineering). Therefore, disassemblers represent the first link of a long chain of s...
Roberto Paleari, Lorenzo Martignoni, Giampaolo Fre...
ARCS
2004
Springer
13 years 11 months ago
A Note on Certificate Path Verification in Next Generation Mobile Communications
Abstract. Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating partners do not have to exchange secrets in ad...
Matthias Enzmann, Elli Giessler, Michael Haisch, B...