Sciweavers

20 search results - page 3 / 4
» comcom 1999
Sort
View
COMCOM
1998
81views more  COMCOM 1998»
13 years 10 months ago
Secure broadcasting in large networks
In this note, we show that a proposed secure broadcasting scheme is insecure. We also present a modified scheme to overcome this weakness. The modified scheme has the extra adva...
Hung-Min Sun, Shiuh-Pyng Shieh
COMCOM
1999
73views more  COMCOM 1999»
13 years 10 months ago
Securing digital signatures for non-repudiation
Dispute of transactions is a common problem that could jeopardise business. Hence non-repudiation services are essential in business transactions which provide evidence to enable ...
Jianying Zhou, Kwok-Yan Lam
COMCOM
1999
107views more  COMCOM 1999»
13 years 10 months ago
A formalisation and evaluation of certificate policies
Certificate policies play a central role in public key infrastructures, since they are the basis for the evaluation of trust in binding between a key and a subject in a public key...
Tomaz Klobucar, Borka Jerman-Blazic
COMCOM
1999
91views more  COMCOM 1999»
13 years 10 months ago
Group-oriented undeniable signature schemes with a trusted center
Undeniable signature is an intriguing concept introduced by Chaum and Antwerpen at Crypto'89. In 1999, Lee and Hwang presented two group-oriented undeniable signature schemes ...
Narn-Yih Lee, Tzonelih Hwang
COMCOM
1999
87views more  COMCOM 1999»
13 years 10 months ago
Virtual path layout in ATM networks based on the P-median problem
We study the problem of virtual path layout in ATM networks. Virtual path (VP) and virtual channel are used by the ATM networks in realizing multiplexing, resource management and ...
W. K. Lai, R. F. Chang