Sciweavers

IJNSEC
2010
91views more  IJNSEC 2010»
13 years 7 months ago
An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing
The three-party password-based key exchange protocols using Weil pairing proposed by Wen is vulnerable to impersonation attack. By introducing hard artificial intelligence problem...
Yong Zeng, Jianfeng Ma, Sang-Jae Moon
CRYPTOLOGIA
2010
13 years 9 months ago
Internet Voting Protocol Based on Improved Implicit Security
This paper presents an improved protocol for Internet voting that allows recasting of ballots to eliminate voting errors, encourages early voting and provides an opportunity for c...
Abhishek Parakh, Subhash Kak
IFIP
2005
Springer
14 years 6 months ago
On Anonymity with Identity Escrow
Anonymity with identity escrow attempts to allow users of a service to remain anonymous, while providing the possibility that the service owner can break the anonymity in exception...
Aybek Mukhamedov, Mark Dermot Ryan