Sciweavers

2059 search results - page 14 / 412
» A Directed Threshold - Signature Scheme
Sort
View
ICICS
2010
Springer
14 years 7 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
MSN
2005
Springer
114views Sensor Networks» more  MSN 2005»
15 years 3 months ago
A Directional Antenna Based Path Optimization Scheme for Wireless Ad Hoc Networks
Using directional antennas in wireless ad hoc networks is an attractive issue due to its potential advantages such as spatial reuse, low power consumption and low chance of interfe...
Sung-Ho Kim, Young-Bae Ko
ISCC
2009
IEEE
170views Communications» more  ISCC 2009»
15 years 4 months ago
A directly public verifiable signcryption scheme based on elliptic curves
A directly public verifiable signcryption scheme is introduced in this paper that provides the security attributes of message confidentiality, authentication, integrity, non-repud...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
IPL
2006
70views more  IPL 2006»
14 years 9 months ago
A polynomial time approximation scheme for embedding a directed hypergraph on a ring
We study the problem of embedding a directed hypergraph on a ring that has applications in optical network communications. The undirected version (MCHEC) has been extensively stud...
Kang Li, Lusheng Wang
LOGCOM
2007
84views more  LOGCOM 2007»
14 years 9 months ago
A Sharp Phase Transition Threshold for Elementary Descent Recursive Functions
Harvey Friedman introduced natural independence results for the Peano axioms via certain schemes of combinatorial well-foundedness. We consider here parameterized versions of this...
Arnoud den Boer, Andreas Weiermann