×

Found 101 Documents (Results 1–100)

Batch verifiable computation of polynomials on outsourced data. (English) Zbl 1522.68093

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015, Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 9327, 167-185 (2015).
MSC:  68M25 68M11 94A60
PDFBibTeX XMLCite
Full Text: DOI

Almost optimum secret sharing with cheating detection. (English) Zbl 1398.94198

Chakraborty, Subhra (ed.) et al., Security, privacy, and applied cryptography engineering. 5th international conference, SPACE 2015, Jaipur, India, October 3–7, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-24125-8/pbk; 978-3-319-24126-5/pbk). Lecture Notes in Computer Science 9354, 359-372 (2015).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Limited view adversary codes: bounds, constructions and applications. (English) Zbl 1375.94162

Lehmann, Anja (ed.) et al., Information theoretic security. 8th international conference, ICITS 2015, Lugano, Switzerland, May 2–5, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17469-3/pbk; 978-3-319-17470-9/ebook). Lecture Notes in Computer Science 9063, 214-235 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Detection of algebraic manipulation in the presence of leakage. (English) Zbl 1395.94265

Padró, Carles (ed.), Information theoretic security. 7th international conference, ICITS 2013, Singapore, November 28–30, 2013. Proceedings. Cham: Springer (ISBN 978-3-319-04267-1/pbk; 978-3-319-04268-8/ebook). Lecture Notes in Computer Science 8317, 238-258 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Financial cryptography and data security. 18th international conference, FC 2014, Christ Church, Barbados, March 3–7, 2014. Revised selected papers. (English) Zbl 1317.94005

Lecture Notes in Computer Science 8437. Berlin: Springer (ISBN 978-3-662-45471-8/pbk). xi, 506 p. (2014).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Private message transmission using disjoint paths. (English) Zbl 1353.94030

Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 116-133 (2014).
PDFBibTeX XMLCite
Full Text: DOI arXiv

A true random generator using human gameplay. (English) Zbl 1435.94104

Das, Sajal K. (ed.) et al., Decision and game theory for security. 4th international conference, GameSec 2013, Fort Worth, TX, USA, November 11–12, 2013. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8252, 10-28 (2013).
MSC:  94A17 65C10 91A80
PDFBibTeX XMLCite
Full Text: DOI

On the share efficiency of robust secret sharing and secret sharing with cheating detection. (English) Zbl 1295.94181

Paul, Goutam (ed.) et al., Progress in cryptology – INDOCRYPT 2013. 14th international conference on cryptology in India, Mumbai, India, December 7–10, 2013. Proceedings. Berlin: Springer (ISBN 978-3-319-03514-7/pbk). Lecture Notes in Computer Science 8250, 179-196 (2013).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Message transmission and key establishment: conditions for equality of weak and strong capacities. (English) Zbl 1317.94078

Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 5th international symposium, FPS 2012, Montreal, QC, Canada, October 25–26, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37118-9/pbk). Lecture Notes in Computer Science 7743, 78-94 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25–28, 2013. Proceedings. (English) Zbl 1277.94003

Lecture Notes in Computer Science 7954. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). xiv, 572 p. (2013).
PDFBibTeX XMLCite
Full Text: DOI

Short pairing-efficient threshold-attribute-based signature. (English) Zbl 1305.94087

Abdalla, Michel (ed.) et al., Pairing-based cryptography – Pairing 2012. 5th international conference, Cologne, Germany, May 16–18, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36333-7/pbk). Lecture Notes in Computer Science 7708, 295-313 (2013).
MSC:  94A62 14G50
PDFBibTeX XMLCite
Full Text: DOI

Guessing secrecy. (English) Zbl 1287.94044

Smith, Adam (ed.), Information theoretic security. 6th international conference, ICITS 2012, Montreal, QC, Canada, August 15–17, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32283-9/pbk). Lecture Notes in Computer Science 7412, 1-13 (2012).
MSC:  94A60 94A15
PDFBibTeX XMLCite
Full Text: DOI

Private fingerprint matching. (English) Zbl 1308.94088

Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 426-433 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. (English) Zbl 1246.94010

Lecture Notes in Computer Science 7417. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). xv, 888 p. (2012).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Bounds and constructions for \(1\)-round \((0,\delta )\)-secure message transmission against generalized adversary. (English) Zbl 1304.94082

Mitrokotsa, Aikaterini (ed.) et al., Progress in cryptology – AFRICACRYPT 2012. 5th international conference on cryptology in Africa, Ifrane, Morocco, July 10–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31409-4/pbk). Lecture Notes in Computer Science 7374, 82-98 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secret key establishment over noisy channels. (English) Zbl 1302.94032

Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 4th Canada-France MITACS workshop, FPS 2011, Paris, France, May 12–13, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-27900-3/pbk). Lecture Notes in Computer Science 6888, 132-147 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Automated verification of block cipher modes of operation, an improved method. (English) Zbl 1303.68051

Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 4th Canada-France MITACS workshop, FPS 2011, Paris, France, May 12–13, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-27900-3/pbk). Lecture Notes in Computer Science 6888, 23-31 (2012).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Secret keys from channel noise. (English) Zbl 1281.94010

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 266-283 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Common randomness and secret key capacities of two-way channels. (English) Zbl 1295.94171

Fehr, Serge (ed.), Information theoretic security. 5th international conference, ICITS 2011, Amsterdam, The Netherlands, May 21–24, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20727-3/pbk). Lecture Notes in Computer Science 6673, 76-93 (2011).
MSC:  94A62 94A40
PDFBibTeX XMLCite
Full Text: DOI

Threshold attribute-based signcryption. (English) Zbl 1291.94086

Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 154-171 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Simple and communication complexity efficient almost secure and perfectly secure message transmission schemes. (English) Zbl 1284.94067

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 166-183 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Automated security proof for symmetric encryption modes. (English) Zbl 1273.68109

Datta, Anupam (ed.), Advances in computer science – ASIAN 2009. Information security and privacy. 13th Asian computing science conference, Seoul, Korea, December 14–16, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10621-7/pbk). Lecture Notes in Computer Science 5913, 39-53 (2009).
MSC:  68P25 68T15 94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

New results on unconditionally secure multi-receiver manual authentication. (English) Zbl 1263.94035

Desmedt, Yvo (ed.), Information theoretic security. Second international conference, ICITS 2007, Madrid, Spain, May 25–29, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-642-10229-5/pbk). Lecture Notes in Computer Science 4883, 115-132 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. (English) Zbl 1177.94012

Lecture Notes in Computer Science 5867. Berlin: Springer (ISBN 978-3-642-05443-3/pbk). xiii, 467 p. (2009).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Unconditionally secure approximate message authentication. (English) Zbl 1248.94113

Chee, Yeow Meng (ed.) et al., Coding and cryptology. Second international workshop, IWCC 2009, Zhangjiajie, China, June 1–5, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01813-8/pbk). Lecture Notes in Computer Science 5557, 233-247 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Threshold attribute-based signatures and their application to anonymous credential systems. (English) Zbl 1246.94048

Preneel, Bart (ed.), Progress in cryptology – AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21–25, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02383-5/pbk). Lecture Notes in Computer Science 5580, 198-216 (2009).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Authentication codes in the query model. (English) Zbl 1156.94419

Li, Yongqing (ed.) et al., Coding and cryptology. Proceedings of the first international workshop, Wuyi Mountain, Fujian, China, June 11–15, 2007. Hackensack, NJ: World Scientific (ISBN 978-981-283-223-8/hbk). Series on Coding Theory and Cryptology 4, 214-225 (2008).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

An efficient deniable key exchange protocol (extended abstract). (English) Zbl 1175.94083

Tsudik, Gene (ed.), Financial cryptography and data security. 12th international conference, FC 2008, Cozumel, Mexico, January 28–31, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-85229-2/pbk). Lecture Notes in Computer Science 5143, 47-52 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Information theoretic security. Third international conference, ICITS 2008, Calgary, Canada, August 10–13, 2008. Proceedings. (English) Zbl 1152.94003

Lecture Notes in Computer Science 5155. Berlin: Springer (ISBN 978-3-540-85092-2/pbk). xi, 249 p. (2008).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Construction of universal designated-verifier signatures and identity-based signatures from standard signatures. (English) Zbl 1162.94401

Cramer, Ronald (ed.), Public key cryptography – PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78440-1/pbk). Lecture Notes in Computer Science 4939, 121-140 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

An adversary aware and intrusion detection aware attack model ranking scheme. (English) Zbl 1214.68042

Katz, Jonathan (ed.) et al., Applied cryptography and network security. 5th international conference, ACNS 2007, Zhuhai, China, June 5–8, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72737-8/pbk). Lecture Notes in Computer Science 4521, 65-86 (2007).
PDFBibTeX XMLCite
Full Text: DOI

Non-interactive manual channel message authentication based on eTCR hash functions. (English) Zbl 1213.94162

Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 385-399 (2007).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On the integration of public key data encryption and public key encryption with keyword search. (English) Zbl 1156.94331

Katsikas, Sokratis K. (ed.) et al., Information security. 9th international conference, ISC 2006, Samos Island, Greece, August 30–September 2, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38341-3/pbk). Lecture Notes in Computer Science 4176, 217-232 (2006).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Multi-party concurrent signatures. (English) Zbl 1156.94423

Katsikas, Sokratis K. (ed.) et al., Information security. 9th international conference, ISC 2006, Samos Island, Greece, August 30–September 2, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38341-3/pbk). Lecture Notes in Computer Science 4176, 131-145 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Generic construction of hybrid public key traitor tracing with full-public-traceability. (English) Zbl 1133.94333

Bugliesi, Michele (ed.) et al., Automata, languages and programming. 33rd international colloquium, ICALP 2006, Venice, Italy, July 10–14, 2006. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-35907-4/pbk). Lecture Notes in Computer Science 4052, 264-275 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. (English) Zbl 1113.94001

Lecture Notes in Computer Science 4058. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). xii, 446 p. (2006).
PDFBibTeX XMLCite
Full Text: DOI

An efficient single-key pirates tracing scheme using cover-free families. (English) Zbl 1151.94576

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 4th international conference, ACNS 2006, Singapore, June 6–9, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34703-8/pbk). Lecture Notes in Computer Science 3989, 82-97 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Universal designated verifier signature proof (or how to efficiently prove knowledge of a signature). (English) Zbl 1154.94447

Roy, Bimal (ed.), Advances in cryptology – ASIACRYPT 2005. 11th international conference on the theory and application of cryptology and information security, Chennai, India, December 4–8, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30684-9/pbk). Lecture Notes in Computer Science 3788, 644-661 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Dynamic \(k\)-times anonymous authentication. (English) Zbl 1126.68409

Ioannidis, John (ed.) et al., Applied cryptography and network security. Third international conference, ACNS 2005, New York, NY, USA, June 7–10, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26223-7/pbk). Lecture Notes in Computer Science 3531, 318-333 (2005).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Certificateless public key encryption without pairing. (English) Zbl 1127.94358

Zhou, Jianying (ed.) et al., Information security. 8th international conference, ISC 2005, Singapore, September 20–23, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29001-X/pbk). Lecture Notes in Computer Science 3650, 134-148 (2005).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Cancelable key-based fingerprint templates. (English) Zbl 1127.94357

Boyd, Colin (ed.) et al., Information security and privacy. 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4–6, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26547-3/pbk). Lecture Notes in Computer Science 3574, 242-252 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Radio networks with reliable communication. (English) Zbl 1128.68300

Wang, Lusheng (ed.), Computing and combinatorics. 11th annual international conference, COCOON 2005, Kunming, China, August 16–29, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28061-8/pbk). Lecture Notes in Computer Science 3595, 156-166 (2005).
PDFBibTeX XMLCite
Full Text: DOI

Efficient multi-receiver identity-based encryption and its application to broadcast encryption. (English) Zbl 1081.94516

Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 380-397 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Token-controlled public key encryption. (English) Zbl 1118.68473

Deng, Robert H. (ed.) et al., Information security practice and experience. First international conference, ISPEC 2005, Singapore, April 11–14, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25584-2/pbk). Lecture Notes in Computer Science 3439, 386-397 (2005).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

An efficient signature scheme from bilinear pairings and its applications. (English) Zbl 1198.94169

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 277-290 (2004).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

General group authentication codes and their relation to “unconditionally-secure signatures”. (English) Zbl 1198.94161

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 231-247 (2004).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Symmetric authentication codes with secrecy and unconditionally secure authenticated encryption. (English) Zbl 1113.94314

Canteaut, Anne (ed.) et al., Progress in cryptology – INDOCRYPT 2004. 5th international conference on cryptology in India, Chennai, India, December 20-22, 2004. Berlin: Springer (ISBN 3-540-24130-2/pbk). Lecture Notes in Computer Science 3348, 148-161 (2004).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Some new proxy signature schemes from pairings. (English) Zbl 1084.94521

Chen, Kefei (ed.), Progress on cryptography. 25 years of cryptography in China. Papers of an international workshop on progress on cryptography celebrating Guozhen Xiao’s 70th birthday. With a foreword by Xuejia Lai. Boston, MA: Kluwer Academic Publishers (ISBN 1-4020-7986-9/hbk). The Kluwer International Series in Engineering and Computer Science 769, 59-66 (2004).
MSC:  94A62 94A60
PDFBibTeX XMLCite

Unconditionally secure encryption under strong attacks. (English) Zbl 1098.94625

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 427-439 (2004).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Linear code implies public-key traitor tracing with revocation. (English) Zbl 1098.94632

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 24-35 (2004).
PDFBibTeX XMLCite
Full Text: DOI

Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings. (English) Zbl 1094.94530

Lee, Pil Joong, Advances in cryptology – ASIACRYPT 2004. 10th international conference on the theory and application of cryptology and information security, Jeju Island, Korea, December 5–9, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23975-8/pbk). Lecture Notes in Computer Science 3329, 372-386 (2004).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Verifiable shuffles: a formal model and a Paillier-based efficient construction with provable security. (English) Zbl 1103.68533

Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 61-75 (2004).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

X\(^2\)Rep: enhanced trust semantics for the XRep protocol. (English) Zbl 1103.68511

Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 205-219 (2004).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Traitor tracing for shortened and corrupted fingerprints. (English) Zbl 1327.94072

Feigenbaum, Joan (ed.), Digital rights management. ACM CCS-9 workshop, DRM 2002, Washington, DC, USA, November 18, 2002. Revised papers. Berlin: Springer (ISBN 3-540-40410-4/pbk). Lecture Notes in Computer Science 2696, 81-100 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient verifiably encrypted signature and partially blind signature from bilinear pairings. (English) Zbl 1123.94369

Johansson, Thomas (ed.) et al., Progress in cryptology – INDOCRYPT 2003. 4th international conference on cryptology in India, New Delhi, India, December 8–10, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20609-4/pbk). Lect. Notes Comput. Sci. 2904, 191-204 (2003).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. (English) Zbl 1027.00042

Lecture Notes in Computer Science. 2727. Berlin: Springer. xii, 534 p. (2003).
PDFBibTeX XMLCite
Full Text: DOI Link

A group key distribution scheme with decentralised user join. (English) Zbl 1022.68053

Cimato, Stelvio (ed.) et al., Security in communication networks. Third international conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2576, 146-163 (2003).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: Link

A dynamic group key distribution scheme with flexible user join. (English) Zbl 1031.94535

Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 478-496 (2003).
PDFBibTeX XMLCite
Full Text: Link

An efficient fail-stop signature scheme based on factorization. (English) Zbl 1031.94540

Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 62-74 (2003).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: Link

Collusion secure \(q\)-ary fingerprinting for perceptual content. (English) Zbl 1048.68898

Sander, Tomas (ed.), Security and privacy in digital rights management. ACM CCS-8 workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised papers. Berlin: Springer (ISBN 3-540-43677-4). Lect. Notes Comput. Sci. 2320, 57-75 (2002).
PDFBibTeX XMLCite
Full Text: Link

A 2-secure code with efficient tracing algorithm. (English) Zbl 1033.94542

Menezes, Alfred (ed.) et al., Progress in cryptology – INDOCRYPT 2002. Third international conference on cryptology in India, Hyderabad, India, December 16–18, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00263-4/pbk). Lect. Notes Comput. Sci. 2551, 149-162 (2002).
MSC:  94A60 68P25 94B60
PDFBibTeX XMLCite
Full Text: Link

Linear authentication codes: bounds and constructions. (English) Zbl 1011.94562

Rangan, C. Pandu (ed.) et al., Progress in cryptology - INDOCRYPT 2001. 2nd international conference on cryptology in India, Chennai, India, December 16-20, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2247, 127-135 (2001).
MSC:  94A62 94B65
PDFBibTeX XMLCite

Threshold fail-stop signature schemes based on discrete logarithm and factorization. (English) Zbl 1044.68615

Pieprzyk, Josef (ed.) et al., Information security. 3rd international workshop, ISW 2000, Wollongong, Australia, December 20–21, 2000. Proceedings. Berlin: Springer (ISBN 3-540-41416-9). Lect. Notes Comput. Sci. 1975, 292-307 (2000).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: Link

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

Software