Sciweavers

22 search results - page 2 / 5
» Selective Encryption for Hierarchical MPEG
Sort
View
ITIIS
2010
129views more  ITIIS 2010»
12 years 11 months ago
Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping
Depending on network conditions, a communication network could be overloaded when media are transmitted. Research has been carried out to lessen network overloading, such as by fi...
Dongkyoo Shin, Dongil Shin, Jaewan Shin, Soohan Ki...
CRYPTO
2004
Springer
138views Cryptology» more  CRYPTO 2004»
13 years 9 months ago
Secure Identity Based Encryption Without Random Oracles
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model. Selective identity secure IBE is a slightly w...
Dan Boneh, Xavier Boyen
CCS
2006
ACM
13 years 8 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
ICIP
2002
IEEE
13 years 9 months ago
Representation of motion activity in hierarchical levels for video indexing and filtering
A method for video indexing and filtering based on motion activity characteristics in hierarchical levels is proposed. To extract motion activity information, an MPEG (MPEG-1/2) v...
Xinding Sun, Ajay Divakaran, B. S. Manjunath
EUROCRYPT
2012
Springer
11 years 6 months ago
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
This paper proposes the first inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz...
Tatsuaki Okamoto, Katsuyuki Takashima