Sciweavers

2059 search results - page 7 / 412
» A Directed Threshold - Signature Scheme
Sort
View
ICWN
2009
14 years 7 months ago
Threshold Secret Sharing Authentication Scheme in Noisy Mobile Ad Hoc Networks
- This paper presents a description and performance evaluation of a threshold secret sharing (TSS) authentication scheme for selfsecuring mobile ad hoc networks (MANETs) suffering ...
Shakir Hussain, Hussein Al-Bahadili, Ghassan Issa,...
ICITS
2009
14 years 7 months ago
Linear Threshold Multisecret Sharing Schemes
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here un...
Oriol Farràs, Ignacio Gracia, Sebasti&agrav...
GLOBECOM
2010
IEEE
14 years 7 months ago
Methods of Selecting Threshold for the QoE-Based Video Output Scheme SCS
SCS is a video output scheme which is designed to maximize QoE in audio-video IP transmission; it is featured by the applicability to end
Shuji Tasaka, Akifumi Hirashima
ISMAR
2008
IEEE
15 years 4 months ago
Perception thresholds for augmented reality navigation schemes in large distances
Because the resolution of see-through displays is lower than the resolution of the human eye, perception of AR schemes is complicated in large distances. To discover, how design i...
Marcus Tönnis, Leslie Klein, Gudrun Klinker
AFRICACRYPT
2008
Springer
15 years 4 months ago
Robust Threshold Schemes Based on the Chinese Remainder Theorem
Kamer Kaya, Ali Aydin Selçuk