Srl | Item |
1 |
ID:
149002
|
|
|
Summary/Abstract |
Public key cryptosystems are secure only when the authenticity of the public key is assured. Shao proposed
a new scheme to overcome the problems of the existing schemes, which suffers from two major drawbacks. The
first drawback is the availability of users’ passwords in plaintext format in key server which are prone to attacks
by ill-minded users. The second one is depending on the key server blindly for certificate generation, without
further verification by the user. To overcome these severe drawbacks, we proposed an improved key authentication
scheme based on Chinese remainder theorem and discrete logarithms. Our scheme allows the user to generate his/
her certificate without the help of any trusted third party. This scheme is intended for online services, military and
defense applications to exchange keys securely.
|
|
|
|
|
|
|
|
|
|
2 |
ID:
187406
|
|
|
Summary/Abstract |
The lack of transparency in the work of the Commission on the Limits of the Continental Shelf constitutes a major issue for both submitting and third states. In this respect, a careful reader of the reports of UNCLOS Meeting of the States Parties would not fail to discern the constant calls for transparency in the work of this body. While much has already been said on the transparency/confidentiality issues in the work of the Commission, new issues have emerged, such as the question of transparency in the internal relationship between the Commission and its subcommission. Prompted by this observation, this article discusses the process of implementing Article 76 of UNCLOS through the prism of transparency, opacity, and confidentiality, with a particular focus on the instances of disagreements between the subcommission and the Commission in plenary.
|
|
|
|
|
|
|
|
|
|