Cryptographic technology: fifteen year forecast
Abstract
References
- Cryptographic technology: fifteen year forecast
Recommendations
Cryptographic tamper evidence
CCS '03: Proceedings of the 10th ACM conference on Computer and communications securityWe propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div can determine whether one of them was generated by the forger. ...
Escrow-free encryption supporting cryptographic workflow
Since Boneh and Franklin published their seminal paper on identity based encryption (IBE) using the Weil pairing, there has been a great deal of interest in cryptographic primitives based on elliptic-curve pairings. One particularly interesting ...
Technology adoption in the public sector: an exploratory study of e-government in Malaysia
ICEGOV '07: Proceedings of the 1st international conference on Theory and practice of electronic governanceAll around the world, the quest to improve government service delivery is becoming an important agenda for most governments. Information and Communications Technology (ICT) and the Internet in particular have opened new possibilities for the government ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 643Total Downloads
- Downloads (Last 12 months)115
- Downloads (Last 6 weeks)11
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in