We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 641-655 of 655 results
  1. A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments

    Most of the current Internet trading frameworks, in particular their negotiation and payment phases, are intended for customers frequently connected...
    Xun Yi, Chee Kheong Siew, ... Eiji Okamoto in Security of Data and Transaction Processing
    Chapter 2000
  2. Disallowing Unauthorized State Changes of Distributed Shared Objects

    Attaching digital signatures to state update messages in global distributed shared object (DSO) systems is not trivial. If the DSO consists of a...
    J. Leiwo, C. Hänle, ... A. S. Tanenbaum in Information Security for Global Information Infrastructures
    Conference paper 2000
  3. Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison

    Mitchell and Yeun [8] showed that Chen’s scheme [2] is not a digital signature scheme with message recovery, whereas it should be called an...
    Chan YeobYeun⋆ in Cryptography and Coding
    Conference paper 1999
  4. Encrypted Message Authentication by Firewalls

    Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant...
    Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng in Public Key Cryptography
    Conference paper 1999
  5. Delegated Decryption

    This paper proposes a new public key based system that enables us to have a single public key with one or more decryption keys and a unique signing...
    Yi Mu, Vijay Varadharajan, Khan Quac Nguyen in Cryptography and Coding
    Conference paper 1999
  6. On the Powerline System

    The powerline system introduced by H.W. Lenstra in 1991 is a modification of the Chor-Rivest system, which was based upon a theorem by Bose and...

    Article 01 May 1999
  7. Signcryption and its applications in efficient public key solutions

    Signcryption is a new paradigm in public key cryptography that simultaneously fulfills both the functions of digital signature and public key...
    Yuliang Zheng in Information Security
    Conference paper 1998
  8. A signcryption scheme with signature directly verifiable by public key

    Signcryption, first proposed by Zheng [4, 5], is a cryptographic primitive which combines both the functions of digital signature and public key...
    Feng Bao, Robert H. Deng in Public Key Cryptography
    Conference paper 1998
  9. LITESET: A light-weight secure electronic transaction protocol

    The past few years have seen the emergence of a large number of proposals for electronic payments over open networks. Among these proposals is the...
    Goichiro Hanaoka, Yuliang Zheng, Hideki Imai in Information Security and Privacy
    Conference paper 1998
  10. Compact and flexible resolution of CBT multicast key-distribution

    In an open network such as the Internet, multicast security services typically start with group session-key distribution. Considering scalability for...
    Kanta Matsuura, Yuliang Zheng, Hideki Iman in Worldwide Computing and Its Applications — WWCA'98
    Conference paper 1998
  11. A framework for the management of information security

    Information security is strongly dependent on access control models and cryptographic techniques. These are well established areas of research and...
    Jussipekka Leiwo, Yuliang Zheng in Information Security
    Conference paper 1998
  12. Security issues for contactless smart cards

    We review the current technologies of contactless smart cards and compare them with contact cards. We discuss the problems of implementing encryption...
    Michael W. David, Kouichi Sakurai in Public Key Cryptography
    Conference paper 1998
  13. CRYPTO ’97

    Chapter 1998
  14. On the security of ElGamal based encryption

    The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However, its security has...
    Yiannis Tsiounis, Moti Yung in Public Key Cryptography
    Conference paper 1998
  15. Digital signcryption or how to achieve cost(signature & encryption) ≪ cost(signature) + cost(encryption)

    Secure and authenticated message delivery/storage is one of the major aims of computer and communication security research. The current standard...
    Conference paper 1997
Did you find what you were looking for? Share feedback.