Digital security

Results: 4317



#Item
981Security / Supply chain management / Actuarial science / Risk management / Risk / Stuart Madnick / Data quality / Yossi Sheffi / Supply chain / Business / Management / Technology

Interdependence of Security and the Extended Enterprise (I-SEE SIG) A New Special Interest Group at the MIT Center for eBusiness Associated Faculty: Arnold Barnett, Gabriel Bitran, John Carroll, Nazli Choucri, Steve Grav

Add to Reading List

Source URL: digital.mit.edu

Language: English - Date: 2005-09-07 12:44:31
982Electronic commerce / Digital signature / Public key certificate / RSA / Group signature / BLS / Cryptography / Public-key cryptography / Key management

A preliminary version of this paper appears in Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 276–285, S. De Capitani di Vimercati and P. Syverson eds., ACM Press, 2007. T

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-02-21 16:37:42
983Finite fields / Cyberwarfare / Applied mathematics / Digital signature / Key management / XTR / RSA / Structure / BLS / Public-key cryptography / Cryptography / Mathematics

Waters Signatures with Optimal Security Reduction Dennis Hofheinz1 , Tibor Jager1 , and Edward Knapp2 1 Institut f¨ur Kryptographie und Sicherheit, Karlsruhe Institute of Technology, Germany, {dennis.hofheinz,tibor.jage

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-29 04:15:53
984Passenger name record / Security / European Union directives / Telecommunications data retention / Fundamental Rights Agency / Information privacy / Data Retention Directive / European Digital Rights / Privacy / Ethics / Data privacy / Information sensitivity

Proposal for a Directive on the use of Passenger Name Record data for the prevention, detection, investigation and prosecution of terrorist offences and serious crime European Digital Rights has many serious concerns reg

Add to Reading List

Source URL: edri.org

Language: English - Date: 2013-12-11 05:33:00
985Ergo Proxy / Cryptography / Blind signature / Digital signature

Security Analysis of Lal and Awasthi’s Proxy Signature Schemes Manik Lal Das, Ashutosh Saxena and V P Gulati Institute for Development and Research in Banking Technology, Castle Hills, Road No.1, Masab Tank, Hyderabad-

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-24 02:00:22
986Applied mathematics / Quantum cryptography / Emerging technologies / Quantum key distribution / Quantum digital signature / BB84 / Quantum computer / Quantum error correction / Qubit / Cryptography / Quantum information science / Theoretical computer science

QUANTUM DIGITAL SIGNATURE BASED ON QUANTUM ONE-WAY FUNCTIONS Xin L¨u State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing, 100039,China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-27 20:46:34
987Cyberwarfare / Electronic commerce / Civil law / Token coin / Tokens / Group signature / Security / Public key certificate / Digital signature / Cryptography / Key management / Public-key cryptography

Full version of an extended abstract published in Proceedings of ACM CCS 2006, ACM Press, 2006. Available from the IACR Cryptology ePrint Archive as ReportHow to Win the Clone Wars: Efficient Periodic n-Times

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-04-11 21:27:39
988Zero-knowledge proof / IP / NP / Designated verifier signature / Cryptography / Undeniable signature / Digital signature

An Attack on Not-interactive Designated Verifier Proofs for Undeniable Signatures Guilin Wang Infocomm Security Department (ICSD) Institute for Infocomm Research (I2 R) 21 Heng Mui Keng Terrace, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-25 09:04:06
989Certificateless cryptography / Applied mathematics / Security / Digital signature / BLS / Key signature / RSA / Public-key cryptography / Cryptography / Cyberwarfare

Efficient Certificateless Signatures Suitable for Aggregation Rafael Castro∗ Ricardo Dahab

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-06 13:51:07
990Cryptographic hash functions / Computer security / Hash tree / Peer-to-peer / Trusted timestamping / Hash function / Digital signature / Hash list / Linked timestamping / Cryptography / Hashing / Error detection and correction

Keyless Signatures’ Infrastructure: How to Build Global Distributed Hash-Trees Ahto Buldas1,2 , Andres Kroonmaa1 , and Risto Laanoja1,2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-15 18:39:49
UPDATE