Sciweavers

61 search results - page 12 / 13
» Repairing Efficient Threshold Group Signature Scheme
Sort
View
EUROCRYPT
2000
Springer
13 years 9 months ago
Computing Inverses over a Shared Secret Modulus
We discuss the following problem: Given an integer shared secretly among n players and a prime number e, how can the players efficiently compute a sharing of e-1 mod . The most in...
Dario Catalano, Rosario Gennaro, Shai Halevi
TWC
2008
154views more  TWC 2008»
13 years 5 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
MICCAI
2006
Springer
14 years 6 months ago
Multi-resolution Vessel Segmentation Using Normalized Cuts in Retinal Images
Abstract. Retinal vessel segmentation is an essential step of the diagnoses of various eye diseases. In this paper, we propose an automatic, efficient and unsupervised method based...
Wenchao Cai, Albert C. S. Chung
EUROPKI
2009
Springer
13 years 3 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
ICNP
1999
IEEE
13 years 10 months ago
Effect of Unreliable Nodes on QoS Routing
A number of QoS routing algorithms have been proposed to address the dual objective of selecting feasible paths through the network with enough resources to satisfy a connections&...
Swapna S. Gokhale, Satish K. Tripathi