Search
Search Results
-
A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments
Most of the current Internet trading frameworks, in particular their negotiation and payment phases, are intended for customers frequently connected... -
Disallowing Unauthorized State Changes of Distributed Shared Objects
Attaching digital signatures to state update messages in global distributed shared object (DSO) systems is not trivial. If the DSO consists of a... -
Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison
Mitchell and Yeun [8] showed that Chen’s scheme [2] is not a digital signature scheme with message recovery, whereas it should be called an... -
Encrypted Message Authentication by Firewalls
Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant... -
Delegated Decryption
This paper proposes a new public key based system that enables us to have a single public key with one or more decryption keys and a unique signing... -
On the Powerline System
The powerline system introduced by H.W. Lenstra in 1991 is a modification of the Chor-Rivest system, which was based upon a theorem by Bose and...
-
Signcryption and its applications in efficient public key solutions
Signcryption is a new paradigm in public key cryptography that simultaneously fulfills both the functions of digital signature and public key... -
A signcryption scheme with signature directly verifiable by public key
Signcryption, first proposed by Zheng [4, 5], is a cryptographic primitive which combines both the functions of digital signature and public key... -
LITESET: A light-weight secure electronic transaction protocol
The past few years have seen the emergence of a large number of proposals for electronic payments over open networks. Among these proposals is the... -
Compact and flexible resolution of CBT multicast key-distribution
In an open network such as the Internet, multicast security services typically start with group session-key distribution. Considering scalability for... -
A framework for the management of information security
Information security is strongly dependent on access control models and cryptographic techniques. These are well established areas of research and... -
Security issues for contactless smart cards
We review the current technologies of contactless smart cards and compare them with contact cards. We discuss the problems of implementing encryption... -
-
On the security of ElGamal based encryption
The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However, its security has... -
Digital signcryption or how to achieve cost(signature & encryption) ≪ cost(signature) + cost(encryption)
Secure and authenticated message delivery/storage is one of the major aims of computer and communication security research. The current standard...