Sciweavers

700 search results - page 14 / 140
» et 2008
Sort
View
IJNSEC
2010
126views more  IJNSEC 2010»
13 years 2 months ago
Comment on Wu et al.'s Server-aided Verification Signature Schemes
In ProvSec 2008, Wu et al. constructed two server-aided verification signature (SAV-) schemes based on BLS signature. In this paper, we provide a new definition of the security of...
Zhiwei Wang, Licheng Wang, Yixian Yang, Zhengming ...
INFORMATICALT
2007
100views more  INFORMATICALT 2007»
13 years 7 months ago
On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes
Recently, Chen, Chung, and Huang proposed a traceable proxy multisignature scheme based on the elliptic curve cryptosystem. However, this paper shows that the original signers can ...
Pei-Hui Huang, Hsiang-An Wen, Chih-Hung Wang, Tzon...
EUC
2008
Springer
13 years 9 months ago
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
Abstract. Signcryption is a cryptographic primitive that aims at providing confidentiality and authentication simultaneously. Recently in May 2008, a scheme for identity based thre...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
CORIA
2008
13 years 9 months ago
Alignement des ontologies : Utilisation de WordNet et une nouvelle mesure structurelle
Semantic interoperability between heterogeneous sources of information is significant problems because of the number growing of sources of information available on the Web. The use...
Fellah Aissa
INFORSID
2008
13 years 9 months ago
Processus global d'acquisition et de gestion des sigles
This paper deals with an acronym/definition extraction approach from textual data (corpora) and the disambiguation of these definitions (or expansions). Both steps of our global pr...
Mathieu Roche, Violaine Prince