Sciweavers

13 search results - page 2 / 3
» Extracting Group Signatures from Traitor Tracing Schemes
Sort
View
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 3 months ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang
ICIP
2006
IEEE
14 years 6 months ago
Scalable Multimedia Fingerprinting Forensics with Side Information
Digital fingerprinting uniquely labels each distributed copy with user's ID and provides a proactive means to track the distribution of multimedia. Multi-user collusion is a ...
Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
EUROCRYPT
2006
Springer
13 years 8 months ago
Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects
The Isomorphism of Polynomials (IP) [28], which is the main concern of this paper, originally corresponds to the problem of recovering the secret key of a C scheme [26]. Besides, t...
Jean-Charles Faugère, Ludovic Perret
ACSAC
2004
IEEE
13 years 8 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
CCS
2004
ACM
13 years 10 months ago
Direct anonymous attestation
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the Trusted Computing Group as the method for remote authentication of a hardware mo...
Ernest F. Brickell, Jan Camenisch, Liqun Chen