Sciweavers

94
Voted
ISW
2009
Springer
15 years 10 months ago
Risks of the CardSpace Protocol
Sebastian Gajek, Jörg Schwenk, Michael Steine...
106
Voted
ISW
2009
Springer
15 years 10 months ago
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. De...
130
Voted
ISW
2009
Springer
15 years 10 months ago
MAC Precomputation with Applications to Secure Memory
We present ShMAC (Shallow MAC), a fixed input length message authentication code that performs most of the computation prior to the availability of the message. Specifically, Sh...
Juan A. Garay, Vladimir Kolesnikov, Rae McLellan
117
Voted
ISW
2009
Springer
15 years 10 months ago
On the Security of Identity Based Ring Signcryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...