Sciweavers

83 search results - page 8 / 17
» ijnsec 2008
Sort
View
IJNSEC
2008
147views more  IJNSEC 2008»
13 years 6 months ago
Constructing Efficient Certificateless Public Key Encryption with Pairing
Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. Recently, Yum1 and Lee have proposed a generic ser...
Yijuan Shi, Jianhua Li, Jianjun Shi
IJNSEC
2008
143views more  IJNSEC 2008»
13 years 6 months ago
New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme
In 2005, Lee, Kim, and Yoo proposed a nonce-based mutual authentication scheme using smart cards. However, this paper demonstrates that Lee-Kim-Yoo's scheme is vulnerable to ...
Da-Zhi Sun, Zhen-Fu Cao
IJNSEC
2008
92views more  IJNSEC 2008»
13 years 6 months ago
Re-visiting the One-Time Pad
In 1949, Shannon proved the perfect secrecy of the Vernam cryptographic system (One-Time Pad or OTP). It has generally been believed that the perfectly random and uncompressible O...
Nithin Nagaraj, Vivek Vaidya, Prabhakar G. Vaidya
IJNSEC
2008
96views more  IJNSEC 2008»
13 years 6 months ago
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks
In flow-based mix networks, flow correlation attacks have been proposed earlier and have been shown empirically to seriously degrade mix-based anonymous communication systems. In ...
Ye Zhu, Xinwen Fu, Riccardo Bettati
IJNSEC
2008
98views more  IJNSEC 2008»
13 years 6 months ago
A New Type of Designated Confirmer Signatures for a Group of Individuals
A new concept of society-oriented designated confirmer signatures (SDCS) is introduced in this paper. SDCS is well suited to applications where the capability of the signer and th...
Baodian Wei, Fangguo Zhang, Xiaofeng Chen