Sciweavers

CANS
2007
Springer
118views Cryptology» more  CANS 2007»
14 years 3 months ago
Extended Private Information Retrieval and Its Application in Biometrics Authentications
Julien Bringer, Hervé Chabanne, David Point...
CANS
2007
Springer
142views Cryptology» more  CANS 2007»
14 years 3 months ago
Strongly Secure Certificateless Public Key Encryption Without Pairing
Yinxia Sun, Futai Zhang, Joonsang Baek
CANS
2007
Springer
150views Cryptology» more  CANS 2007»
14 years 5 months ago
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Abstract. In this paper we study Perfectly Secure Message Transmission (PSMT) between a sender S and a receiver R, connected in a directed synchronous network through multiple para...
Arpita Patra, Bhavani Shankar, Ashish Choudhary, K...
CANS
2007
Springer
154views Cryptology» more  CANS 2007»
14 years 5 months ago
Forward-Secure Key Evolution in Wireless Sensor Networks
We consider a key distribution scheme for securing node-to-node communication in sensor networks. While most schemes in use are based on random predistribution, we consider a syste...
Marek Klonowski, Miroslaw Kutylowski, Michal Ren, ...
CANS
2007
Springer
137views Cryptology» more  CANS 2007»
14 years 5 months ago
A Generic Construction for Universally-Convertible Undeniable Signatures
Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu
CANS
2007
Springer
96views Cryptology» more  CANS 2007»
14 years 5 months ago
Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication
Abstract. We present a semantic extension to X.509 certificates that allows incorporating new anonymity signature schemes into the X.509 framework. This fact entails advantages to...
Vicente Benjumea, Seung Geol Choi, Javier Lopez, M...