نتایج جستجو برای: unforgeability of ticket

تعداد نتایج: 21164284  

2004
Ivan Osipkov Yongdae Kim Jung Hee Cheon

In this paper, we formally define a notion of timed-release public key based authenticated encryption (TR-PKAE). In addition to standard time-independent security properties (such as IND-CCA security for confidentiality and ciphertext/plaintext unforgeability), TR-PKAE introduces requirements such as timed-release receiver confidentiality (IND-RTR-CCA), which precludes the receiver from decrypt...

Journal: :Library Trends 2013
Ran Huo Qunyi Wei

LIBRARY TRENDS, Vol. 62, No. 1, 2013 (“Community Informatics in China,” edited by Kate Williams), pp. 105–120. © 2013 The Board of Trustees, University of Illinois Abstract This study discusses strategies for narrowing the digital divide by examining the real-name and ID requirement policy that governs online purchases of train tickets in China. Using a case study, the authors of this study ask...

Journal: :JCP 2012
Wei Yuan Liang Hu Hongtu Li Jianfen Chu Hui Wang

1 *corresponding author: Jianfeng Chu Abstract— Signcryption can realize the function of encryption and signature in a reasonable logic step, which can lower computational costs and communication overheads. In 2008, Fagen Li et al. proposed an efficient secure id-based threshold signcryption scheme. The authors declared that their scheme had the attributes of confidentiality and unforgeability ...

Journal: :IACR Cryptology ePrint Archive 2009
Markus Rückert Dominique Schröder

In a verifiably encrypted signature scheme, signers encrypt their signature under the public key of a trusted third party and prove that they did so correctly. The security properties are unforgeability and opacity. Unforgeability states that a malicious signer should not be able to forge verifiably encrypted signatures and opacity prevents extraction from an encrypted signature. This paper pro...

Journal: :I. J. Network Security 2015
Hu Xiong Ji Geng Zhiguang Qin Guobin Zhu

Signcryption can offer authentication and confidentiality simultaneously with better efficiency than traditional signature-then-encryption approach. Ring signature enables a user to conscribe arbitrarily a group of ring members and sign a message on behalf of the ring (which includes himself) without revealing his real identity. By integrating the notion of signcryption and ring signature, ring...

2014
MICHAEL SCHOLL

The four tickets in this year’s student body presidential race disagreed on the issue of open­ ness in student government, but a g r e e d on th e n eed to tak e stronger action again st crim e during last night’s student body presidential debate. Both the Greg Butrus/M olly O’Neill ticket and the Rich Delevan/Joe Wilson ticket said they supported the closing of student g o v ern m en t m e e t...

2014
KATIE WAGNER

Notre Dame students already fed up with ticket sales could add another gripe to the list after long lines made the Keenan Revue ticket d is tribu tion last only 23 minutes. Although ticke t w indows did not open until 2 p.m. Friday, the firs t students to receive tickets arrived at gate 10 o f the Joyce Center as early as 10 a.m. “A good portion o f the line was formed by 1 or 1:30 p.m.,” ticke...

2002
Dominik Gruntz René Müller

For the Java component model J2EE, Sun has published guidelines which show how to use their technology effectively to create enterprise applications. These guidelines are illustrated in the two example enterprise application blueprints Pet Store and Smart Ticket. Since our group is working on a wireless project, we investigated the Smart Ticket demo application. This paper describes our experie...

Journal: :Journal of Statistics Education 2019

Journal: :Politics of the Low Countries 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید