We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 83 results
  1. Another ID-based proxy signature scheme and its extension

    So far, the security of many proxy signatures has seldom been considered in a formal way and most of them cannot satisfy non-repudiation. In this...

    Article 01 January 2007
  2. Provable efficient certificateless group key exchange protocol

    Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to...

    Cao Chunjie, Ma Jianfeng, Moon Sangjae in Wuhan University Journal of Natural Sciences
    Article 01 January 2007
  3. Collapsing the Wave Function of Meaning: The Epistemological Matrix of Talk-in-Interaction

    Devoted to an explication of how interacting agents mutually and micro-temporally provide for each other the grounds for immediate next action in the...
    Donald Favareau in A Legacy for Living Systems
    Chapter 2008
  4. Escrow-free certificate-based authenticated key agreement protocol from pairings

    Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem of identity-based...

    Wang Shengbao, Cao Zhenfu in Wuhan University Journal of Natural Sciences
    Article 01 January 2007
  5. Electronic payment scheme to prevent the treachery

    Treachery is one of the restrictions to the development of electronic commerce. To prevent the treachery from the participants in electronic...

    Fan Kai, Zhang Jun, ... **ao Guozhen in Wuhan University Journal of Natural Sciences
    Article 01 November 2006
  6. Identity based group key agreement in multiple PKG environment

    Secure and reliable group communication is an increasingly active research area by growing popularity in group-oriented and collaborative...

    Wang Liming, Wu Chuankun in Wuhan University Journal of Natural Sciences
    Article 01 November 2006
  7. Improved authenticated multi-key agreement protocol

    Zhou et al give an attack on Harn's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share...

    Zhang Hua, Yuan Zheng, Wen Qiaoyan in Wuhan University Journal of Natural Sciences
    Article 01 November 2006
  8. Practical Internet voting protocol without strong physical assumption

    Internet voting protocols is the base of the Internet voting systems. In this paper a new practical Internet voting protocol is introduced. The...

    Article 01 January 2007
  9. Efficient certificateless authenticated key agreement protocol from pairings

    In the area of secure Web information system, mutual authentication and key agreement are essential between Web clients and servers. An efficient...

    Wang Shengbao, Cao Zhenfu, Wang Licheng in Wuhan University Journal of Natural Sciences
    Article 01 September 2006
  10. An improved identity-based society oriented signature scheme with anonymous signers

    In this paper, we present an improved identity-based society oriented signature scheme with anonymous signers, which satisfies: (1) when members...

    Article 01 January 2007
  11. A new protocol for multi-item electronic auctions

    The authors propose a new protocol for multizzitem electronic auctions. It has the following advantages: first, the protocol is more applicable and...

    Huang Genxun, Zhou Ran, ... Yu Gang in Wuhan University Journal of Natural Sciences
    Article 01 November 2006
  12. Homomorphism key agreement based on RSA

    This paper reviews the basic content of key management, points out the limitation of the existing key agreement protocols. It introduces RSA public...

    **ang Guangli, Zhu **, ... Ma Jie in Wuhan University Journal of Natural Sciences
    Article 01 November 2006
  13. Systems Support for Remote Visualization of Genomics Applications over Wide Area Networks

    Microarray experiments can provide molecular-level insight into a variety of biological processes, from yeast cell cycle to tumorogenesis. However,...
    Lars Ailo Bongo, Grant Wallace, ... Olga Troyanskaya in Distributed, High-Performance and Grid Computing in Computational Biology
    Conference paper 2007
  14. A method of homomorphic encryption

    The existing homomorphic encryption scheme is based on ring of the integer, and the possible operators are restricted to addition and multiplication...

    **ang Guang-li, Chen **n-meng, ... Ma Jie in Wuhan University Journal of Natural Sciences
    Article 01 January 2006
  15. A cluster-based secure active network environment

    We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in...

    Chen **ao-lin, Zhou **g-yang, ... Chen Gui-hai in Wuhan University Journal of Natural Sciences
    Article 01 January 2005
  16. Atomic electronic contract protocol based on convertible signature

    A new class of atomicity, namely contract atomicity is presented. A new technical strategy based on convertible signature and two-phase commitment is...

    Liu Yi-chun, Wang Li-na, Zhang Huan-guo in Wuhan University Journal of Natural Sciences
    Article 01 January 2005
  17. Distribution of random session key based on key-insulated public-key cryptosystems

    Based on the characteristic of key-insulated public-key cryptosystem, we propose a distributed random session keys distribution protocol without a...

    Lu Hai-jun, Su Yun-xue, Zhu Yue-fei in Wuhan University Journal of Natural Sciences
    Article 01 January 2005
  18. A new images hiding scheme based on chaotic sequences

    We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of cover image. We use...

    Liu Nian-sheng, Guo Dong-hui, ... Parr G in Wuhan University Journal of Natural Sciences
    Article 01 January 2005
Did you find what you were looking for? Share feedback.