Sciweavers

ACNS
2007
Springer
112views Cryptology» more  ACNS 2007»
14 years 1 months ago
Merkle Signatures with Virtually Unlimited Signature Capacity
We propose GMSS, a new variant of the Merkle signature scheme. GMSS is the first Merkle-type signature scheme that allows a cryptographically unlimited (280 ) number of documents ...
Johannes Buchmann, Erik Dahmen, Elena Klintsevich,...
ACNS
2007
Springer
129views Cryptology» more  ACNS 2007»
14 years 1 months ago
Gradually Convertible Undeniable Signatures
In 1990, Boyar, Chaum, Damg˚ard and Pedersen introduced convertible undeniable signatures which limit the self-authenticating property of digital signatures but can be converted b...
Laila El Aimani, Damien Vergnaud
ACNS
2007
Springer
94views Cryptology» more  ACNS 2007»
14 years 1 months ago
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme
The one-way function tree (OFT) scheme proposed by Balenson et. al is widely regarded as an efficient key management solution for multicast communication in large dynamic groups. ...
Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu
ACNS
2007
Springer
110views Cryptology» more  ACNS 2007»
14 years 1 months ago
Compressed XTR
Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho ...
ACNS
2008
Springer
106views Cryptology» more  ACNS 2008»
14 years 1 months ago
Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography
Ivan Damgård, Lars R. Knudsen, Søren ...
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 1 months ago
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance
Compliance storage is an increasingly important area for businesses faced with a myriad of new document retention regulations. Today, businesses have turned to Write-One Read Many ...
Nikita Borisov, Soumyadeb Mitra
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 1 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
14 years 1 months ago
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks
Abstract. What are the real security issues for a wireless sensor network (WSN) intended to monitor the structural health of a suspension bridge, a subway tunnel or a water distrib...
Frank Stajano, Daniel Cvrcek, Matt Lewis
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
14 years 1 months ago
The Security of EPC Gen2 Compliant RFID Protocols
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard the de facto specification for inexpensive tags in the RFID industry. EPCGen2 supports only very b...
Mike Burmester, Breno de Medeiros
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
14 years 1 months ago
Improved Conditional E-Payments
Abstract. Conditional e-cash or conditional e-payments have been introduced by Shi et al. as the means for enabling electronic payments to be based on the outcome of a certain cond...
Marina Blanton