Sciweavers

ITIIS
2010
129views more  ITIIS 2010»
12 years 11 months ago
Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping
Depending on network conditions, a communication network could be overloaded when media are transmitted. Research has been carried out to lessen network overloading, such as by fi...
Dongkyoo Shin, Dongil Shin, Jaewan Shin, Soohan Ki...
ICSAP
2010
13 years 1 months ago
Enhanced Cost Effective Symmetric Key Algorithm for Small Amount of Data
Security being the major concern during data transfers, we have various challenges to face. The requirements of the security model vary depending on the type of data to be encrypte...
R. Satheesh Kumar, E. Pradeep, K. Naveen, R. Gunas...
BIOSIG
2009
169views Biometrics» more  BIOSIG 2009»
13 years 2 months ago
Reverse Public Key Encryption
Abstract. This exposition paper suggests a new low-bandwidth publickey encryption paradigm. The construction turns a weak form of key privacy into message privacy as follows: let E...
David Naccache, Rainer Steinwandt, Moti Yung
SCN
2010
Springer
163views Communications» more  SCN 2010»
13 years 2 months ago
Time-Specific Encryption
This paper introduces and explores the new concept of Time-Specific Encryption (TSE). In (Plain) TSE, a Time Server broadcasts a key at the beginning of each time unit, a Time Inst...
Kenneth G. Paterson, Elizabeth A. Quaglia
ISAAC
2010
Springer
276views Algorithms» more  ISAAC 2010»
13 years 2 months ago
Anonymous Fuzzy Identity-Based Encryption for Similarity Search
Abstract. In this paper, we consider the problem of predicate encryption and focus on the predicate for testing whether the hamming distance between the attribute X of a data item ...
David W. Cheung, Nikos Mamoulis, W. K. Wong, Siu-M...
ASIACRYPT
2010
Springer
13 years 2 months ago
Structured Encryption and Controlled Disclosure
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
Melissa Chase, Seny Kamara
ASIACRYPT
2010
Springer
13 years 2 months ago
A Closer Look at Anonymity and Robustness in Encryption Schemes
Abstract. In this work, we take a closer look at anonymity and robustness in encryption schemes. Roughly speaking, an anonymous encryption scheme hides the identity of the secret-k...
Payman Mohassel
SCN
2010
Springer
187views Communications» more  SCN 2010»
13 years 2 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
MFCS
2010
Springer
13 years 2 months ago
A dexptime-Complete Dolev-Yao Theory with Distributive Encryption
In the context of modelling cryptographic tools like blind signatures and homomorphic encryption, the DolevYao model is typically extended with an operator over which encryption i...
Anguraj Baskar, Ramaswamy Ramanujam, S. P. Suresh
TASLP
2002
79views more  TASLP 2002»
13 years 4 months ago
Perception-based partial encryption of compressed speech
Mobile multimedia applications, the focus of many forthcoming wireless services, increasingly demand low-power techniques implementing content protection and customer privacy. In t...
Antonio Servetti, Juan Carlos De Martin