Sciweavers

269 search results - page 2 / 54
» Templates as Master Keys
Sort
View
IJNSEC
2006
94views more  IJNSEC 2006»
13 years 4 months ago
Construction of Dynamic Threshold Decryption Scheme from Pairing
The first dynamic threshold decryption scheme from pairing is presented. It is secure in groups equipped with a bilinear map, and caters to some important requirements in real app...
Yu Long, Kefei Chen
ASIACRYPT
2000
Springer
13 years 9 months ago
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques
Rather than use a shared key directly to cryptographically process (e.g. encrypt or authenticate) data one can use it as a master key to derive subkeys, and use the subkeys for the...
Michel Abdalla, Mihir Bellare
JWE
2002
64views more  JWE 2002»
13 years 4 months ago
A Proposed Curriculum for a Masters in Web Engineering
To address the significant technical demand for trained Web Engineers, and to raise the current state of the practice of Web Engineering, a Master's level degree program in W...
E. James Whitehead Jr.
GI
2005
Springer
13 years 10 months ago
Alignment of Product Master Data
: Market research draws a coherent picture of the market based on extensive observations of sales acts from numerous data sources. As the data sources refer to the products sold al...
Thomas Kirsche, Gerhard Baumann, Anja Schanzenberg...
ACISP
2005
Springer
13 years 10 months ago
Cancelable Key-Based Fingerprint Templates
Biometric based authentication can provide strong security guarantee about the identity of users. Security of biometric data is particularly important as compromise of the data wil...
Russell Ang, Reihaneh Safavi-Naini, Luke McAven