Sciweavers

20 search results - page 4 / 4
» Visual Secret Sharing Schemes for Multiple Secret Images All...
Sort
View
ICISC
2004
147views Cryptology» more  ICISC 2004»
13 years 6 months ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
ASIACRYPT
2010
Springer
13 years 3 months ago
Constant-Size Commitments to Polynomials and Their Applications
We introduce and formally define polynomial commitment schemes, and provide two efficient constructions. A polynomial commitment scheme allows a committer to commit to a polynomial...
Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
INFOCOM
2010
IEEE
13 years 2 months ago
Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks
Body Area Networks (BAN) is a key enabling technology in E-healthcare such as remote health monitoring. An important security issue during bootstrap phase of the BAN is to securely...
Ming Li, Shucheng Yu, Wenjing Lou, Kui Ren
CANS
2009
Springer
165views Cryptology» more  CANS 2009»
13 years 12 months ago
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
Abstract. Wireless sensor networks have several useful applications in commercial and defense settings, as well as user-centric personal area networks. To establish secure (point-t...
Nitesh Saxena, Md. Borhan Uddin
SPIESR
2004
167views Database» more  SPIESR 2004»
13 years 6 months ago
BioMedia: multimedia information systems for biology research, education, and collaboration
The long-term goals of the recently started Biomedia project at SFSU are to provide multimedia information systems and applications for the research and education needs of several...
E. Lank, Dragutin Petkovic, F. A. Ramirez-Weber, J...