Sciweavers

35 search results - page 4 / 7
» scn 2008
Sort
View
SCN
2008
Springer
105views Communications» more  SCN 2008»
13 years 5 months ago
Expressive Subgroup Signatures
In this work, we propose a new generalization of the notion of group signatures, that allows signers to cover the entire spectrum from complete disclosure to complete anonymity. Pr...
Xavier Boyen, Cécile Delerablée
SCN
2008
Springer
119views Communications» more  SCN 2008»
13 years 5 months ago
Integrating fingerprint with cryptosystem for internet-based live pay-TV system
In the last few years, live pay-TV system via internet has come to be established with the development of broadband network. To develop such a system, a mechanism for content prote...
Shuhui Hou, Tetsutaro Uehara, Takashi Satoh, Yoshi...
SCN
2008
Springer
142views Communications» more  SCN 2008»
13 years 5 months ago
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running sy...
Yehuda Lindell, Benny Pinkas, Nigel P. Smart
SCN
2008
Springer
13 years 5 months ago
Using Normal Bases for Compact Hardware Implementations of the AES S-Box
Abstract. The substitution box (S-box) of the Advanced Encryption Standard (AES) is based on the multiplicative inversion s(x) = x-1 in GF(256) and followed by an affine transforma...
Svetla Nikova, Vincent Rijmen, Martin Schläff...
SCN
2008
Springer
166views Communications» more  SCN 2008»
13 years 5 months ago
Secure, pseudonymous, and auditable communication in vehicular ad hoc networks
Abstract-- Vehicular ad hoc networks (VANETs) represent a promising new communication technology that can facilitate many new forms of automotive applications. Many of the applicat...
Pandurang Kamat, Arati Baliga, Wade Trappe