Sciweavers

EUROPKI
2007
Springer
14 years 1 months ago
Anonymous k -Show Credentials
Mohamed Layouni, Hans Vangheluwe
EUROPKI
2007
Springer
14 years 1 months ago
Bootstrapping a Global SSO from Network Access Control Mechanisms
Manuel Sánchez, Gabriel López Mill&a...
EUROPKI
2007
Springer
14 years 1 months ago
Universally Composable Signcryption
Kristian Gjøsteen, Lillian Kråkmo
EUROPKI
2007
Springer
14 years 1 months ago
On Partial Anonymity in Secret Sharing
Abstract. Anonymous secret sharing schemes allow a secret to be recovered from shares regardless of the identity of shareholders. Besides being interesting in its own right, this p...
Vanesa Daza, Josep Domingo-Ferrer
EUROPKI
2007
Springer
14 years 1 months ago
An Interdomain PKI Model Based on Trust Lists
Helena Rifà-Pous, Jordi Herrera-Joancomart&...
EUROPKI
2007
Springer
14 years 1 months ago
Applicability of Public Key Infrastructures in Wireless Sensor Networks
Abstract. Wireless Sensor Networks (WSN) are becoming a key technology in the support of pervasive and ubiquitous services. The previous notion of “PKC is too expensive for WSN...
Rodrigo Roman, Cristina Alcaraz
ESORICS
2007
Springer
14 years 1 months ago
Generalized Key Delegation for Hierarchical Identity-Based Encryption
Michel Abdalla, Eike Kiltz, Gregory Neven
ESORICS
2007
Springer
14 years 1 months ago
On the Automated Correction of Security Protocols Susceptible to a Replay Attack
Although there exist informal design guidelines and formal development support, security protocol development is time-consuming because design is error-prone. In this paper, we int...
Juan Carlos López Pimentel, Raul Monroy, Di...
ESORICS
2007
Springer
14 years 1 months ago
A Policy Language for Distributed Usage Control
We present the Obligation Specification Language (OSL), a policy language for distributed usage control. OSL supports the formalization of a wide range of usage control requiremen...
Manuel Hilty, Alexander Pretschner, David A. Basin...
ESORICS
2007
Springer
14 years 1 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...