Skip to main content

previous disabled Page of 4
and
Your search also matched 418 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

On Zhang's nonrepudiable proxy signature schemes

Include preview-only content
  1. Chapter and Conference Paper

    Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords

    A password-authenticated key exchange scheme allows two entities, who only share a memorable password, to authenticate each other and to agree on a cryptographic session key. Instead of considering it in the c...

    Shuhong Wang, Jie Wang, Maozhi Xu in Applied Cryptography and Network Security (2004)

  2. Chapter and Conference Paper

    Cooperative Caching with Optimal Radius in Hybrid Wireless Networks

    In this paper, we propose a novel caching scheme, called energy efficient cooperative caching with optimal radius (ECOR), to overcome the limitations of hybrid wireless networks such as high energy consumption, l...

    Hua** Shen, Sajal K. Das, Mohan Kumar, Zhijun Wang in Networking 2004 (2004)

  3. Chapter and Conference Paper

    Performance of Directional Collision Avoidance in Ad Hoc Networks

    This paper analyzes the performance of directional collision avoidance schemes, in which antenna systems are used to direct the transmission and reception of control and data packets in channel access protocol...

    Yu Wang, Jose Joaquin Garcia-Luna-Aceves in Networking 2004 (2004)

  4. Chapter and Conference Paper

    Multi-objective Egress Router Selection Policies for Inter-domain Traffic with Bandwidth Guarantees

    The next generation Internet is designed to accommodate flows that span across multiple domains with quality of service guarantees, in particular bandwidth. In this context, destinations for inter-domain traff...

    Kin-Hon Ho, Ning Wang, Panos Trimintzios, George Pavlou in Networking 2004 (2004)

  5. Chapter and Conference Paper

    Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks

    Multiple-time signatures are digital signature schemes where the signer is able to sign a predetermined number of messages. They are interesting cryptographic primitives because they allow to solve many import...

    Josef Pieprzyk, Huaxiong Wang, Selected Areas in Cryptography (2004)

  6. Chapter and Conference Paper

    Network-Embedded Programmable Storage and Its Applications

    We consider the utility of two key properties of network-embedded storage: programmability and network-awareness. We describe two extensive applications, whose performance and functionalities are significantly...

    Sumeet Sobti, Junwen Lai, Yilei Shao, Nitin Garg, Chi Zhang, Ming Zhang in Networking 2004 (2004)

  7. Chapter and Conference Paper

    Building Reliable Mix Networks with Fair Exchange

    In this paper we present techniques by which each mix in a mix network can be paid for its services by message senders, in a way that ensures fairness and without sacrificing anonymity. We describe a payment m...

    Michael K. Reiter, **aoFeng Wang in Applied Cryptography and Network Security (2005)

  8. Chapter and Conference Paper

    Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks

    Passwords are one of the most common cause of system break-ins, because the low entropy of passwords makes systems vulnerable to brute force guessing attacks (dictionary attacks). Existing Strong Password-base...

    Peng Wang, Yongdae Kim, Vishal Kher in Applied Cryptography and Network Security (2005)

  9. Chapter and Conference Paper

    An Improved Poly1305 MAC

    In this paper, we propose an improved Poly1305 MAC, called IPMAC. IPMAC is a refinement of Poly1305 MAC shown by Bernstein. We use only one 16-byte key and one 16-byte nonce for IPMAC while Poly1305 MAC uses t...

    Dayin Wang, Dongdai Lin, Wenling Wu in Applied Cryptography and Network Security (2006)

  10. Chapter and Conference Paper

    Real Perfect Contrast Visual Secret Sharing Schemes with Reversing

    The visual secret sharing (VSS for short) scheme is a secret image sharing scheme. A secret image is visually revealed from overlap** shadow images without additional computations. However, the contrast of r...

    Ching-Nung Yang, Chung-Chun Wang in Applied Cryptography and Network Security (2006)

  11. Chapter and Conference Paper

    Adaptive Detection of Local Scanners

    Network attacks often employ scanning to locate vulnerable hosts and services. Fast and accurate detection of local scanners is key to containing an epidemic in its early stage. Existing scan detection schemes...

    Ahren Studer, Chenxi Wang in Applied Cryptography and Network Security (2006)

  12. Chapter and Conference Paper

    Open Source Communities in China (Mainland): An Overview

    Open Source Software development has been an important software development way in last decade. Meanwhile, the Open Source Communities also grow fast in these years and become more and more important. This pap...

    Yi Wang, Fan Li, Jiguang Song in Online Communities and Social Computing (2007)

  13. Chapter and Conference Paper

    Cooperation and Competition Dynamics in an Online Game Community

    Cooperation and competition are important subjects in social and economical studies. Similar dynamics exists in large-scale online communities. In this paper, we present a quantitative study on the cooperation...

    Ruixi Yuan, Li Zhao, Wenyu Wang in Online Communities and Social Computing (2007)

  14. Chapter and Conference Paper

    A Study of Emotional and Rational Purchasing Behavior for Online Shop**

    Emotion has gained much attention in product design over recent years. It is not surprised that the aesthetic appeal may determine the fate of a product, namely its success or failure in the market. Unlike the...

    Lifen Yeh, Eric Min-Yang Wang, Sheue-Ling Huang in Online Communities and Social Computing (2007)

  15. Chapter and Conference Paper

    The Delicate Issues of Addition with Respect to XOR Differences

    In this paper we analyze the previous attacks on the block cipher SHACAL-1 and show that all the differential-based attacks fail due to mistreatment of XOR differences through addition. We show that the previo...

    Gaoli Wang, Nathan Keller, Orr Dunkelman in Selected Areas in Cryptography (2007)

  16. Chapter and Conference Paper

    Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme

    The one-way function tree (OFT) scheme proposed by Balenson et al. is widely regarded as an efficient key management solution for multicast communication in large dynamic groups. Following Horng’s claim that the ...

    Xuxin Xu, Lingyu Wang, Amr Youssef, Bo Zhu in Applied Cryptography and Network Security (2007)

  17. Chapter and Conference Paper

    A More Natural Way to Construct Identity-Based Identification Schemes

    Constructing identification schemes is one of the fundamental problems in cryptography, and is very useful in practice. An identity-based identification (IBI) scheme allows a prover to identify itself to a pub...

    Guomin Yang, **g Chen, Duncan S. Wong in Applied Cryptography and Network Security (2007)

  18. Chapter and Conference Paper

    PSH: A Private and Shared History-Based Incentive Mechanism

    Fully decentralized peer-to-peer (P2P) systems do not have a central control mechanism. Thus, different forms of control mechanisms are required to deal with selfish peers. One type of selfish behavior is the ...

    Thomas Bocek, Wang Kun, Fabio Victora Hecht in Resilient Networks and Services (2008)

  19. Chapter and Conference Paper

    Ethnographic User Study and Concept Design for Chinese Migrant Workers’ Social Networks

    Online social networking services are hot in the recent years, but most of theses services in China aimed at the college students and business people, ignoring that Chinese migrant workers could be one of the ...

    Jie Wang, Wei Wang, Ying Liu, **a Wang in Online Communities and Social Computing (2009)

  20. Chapter and Conference Paper

    Mobile Social Service Design for Large-Scale Exhibition

    In order to improve the exhibition service, technology enhanced visitor experience is gradually gaining more attention. In this paper, we follow user-centered design to explore the possibility of building a mo...

    Huanglingzi Liu, Ying Liu, Wei Wang, Bin Wang in Online Communities and Social Computing (2009)

previous disabled Page of 4