Zobrazeno 1 - 10
of 234
pro vyhledávání: '"Desmedt, Y"'
Autor:
Vandewalle, J., Berbers, Y., Hildebrandt, M., Debeuckelaere, W., Hert, P. de, Desmedt, Y., Smet, F. De, Poels, K., Pierson, J., Preneel, B.
Publikováno v:
KVAB Standpunt ; 49. Brussel : KVAB Press
KVAB Standpunt ; 49
KVAB Standpunt ; 49
Contains fulltext : 181649.pdf (Publisher’s version ) (Open Access) 65 p.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::668326238aa6d8ba9db048b3476535fd
http://hdl.handle.net/2066/181649
http://hdl.handle.net/2066/181649
Publikováno v:
In Future Generation Computer Systems 2000 16(4):393-401
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783540462552
Financial Cryptography
Financial cryptography and data security : 10th international conference, FC'06, Anguilla, British West Indies, February 27-March 2, 2006 : revised selected papers, 154-159
STARTPAGE=154;ENDPAGE=159;TITLE=Financial cryptography and data security : 10th international conference, FC'06, Anguilla, British West Indies, February 27-March 2, 2006 : revised selected papers
Financial Cryptography
Financial cryptography and data security : 10th international conference, FC'06, Anguilla, British West Indies, February 27-March 2, 2006 : revised selected papers, 154-159
STARTPAGE=154;ENDPAGE=159;TITLE=Financial cryptography and data security : 10th international conference, FC'06, Anguilla, British West Indies, February 27-March 2, 2006 : revised selected papers
In this paper we apply techniques from secret sharing and threshold decryption to show how to properly design an ID-based threshold system in which one assumes no trust in any party. In our scheme: – We avoid that any single machine ever knew the m
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783540852292
Financial Cryptography
Financial Cryptography and Data Security (12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers), 53-68
STARTPAGE=53;ENDPAGE=68;TITLE=Financial Cryptography and Data Security (12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers)
Financial Cryptography
Financial Cryptography and Data Security (12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers), 53-68
STARTPAGE=53;ENDPAGE=68;TITLE=Financial Cryptography and Data Security (12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers)
Secure communication within a large group of users such as participants in a phone or video conference relies on the availability of secure data and efficient data transmission. Group key exchange protocols allow a (large) group of nusers to establis
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9de45e3ca1bab759d13458f873c22e39
https://doi.org/10.1007/978-3-540-85230-8_5
https://doi.org/10.1007/978-3-540-85230-8_5
Publikováno v:
Revised selected papers of the 11th International Conference on Financial Cryptography and Data Security & First International Workshop on Usable Security (FC 2007 & USEC 2007) 12-16 February 2007, Scarborough, Trinidad and Tobago, 104-118
STARTPAGE=104;ENDPAGE=118;TITLE=Revised selected papers of the 11th International Conference on Financial Cryptography and Data Security & First International Workshop on Usable Security (FC 2007 & USEC 2007) 12-16 February 2007, Scarborough, Trinidad and Tobago
Financial Cryptography and Data Security ISBN: 9783540773658
Financial Cryptography
STARTPAGE=104;ENDPAGE=118;TITLE=Revised selected papers of the 11th International Conference on Financial Cryptography and Data Security & First International Workshop on Usable Security (FC 2007 & USEC 2007) 12-16 February 2007, Scarborough, Trinidad and Tobago
Financial Cryptography and Data Security ISBN: 9783540773658
Financial Cryptography
Task-specific groups are often formed in an ad-hoc manner within large corporate structures, such as companies. Take the following typical scenario: A director decides to set up a task force group for some specific project. An order is passed down th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::80f0e5a2ddc702e83d2ec3e67fbda891
https://research.tue.nl/en/publications/6c6d1335-db42-4269-bed0-9d29133656d8
https://research.tue.nl/en/publications/6c6d1335-db42-4269-bed0-9d29133656d8
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.