Sciweavers

1166 search results - page 77 / 234
» Adaptively Secure Broadcast
Sort
View
104
Voted
MSWIM
2005
ACM
15 years 6 months ago
Application of synchronous dynamic encryption system in mobile wireless domains
Motivated by the tradeoff between security and efficiency performance parameters that has been imposed on all modern wireless security protocols, we designed a novel security syst...
Hamdy S. Soliman, Mohammed Omari
CCS
1999
ACM
15 years 4 months ago
Signature Schemes Based on the Strong RSA Assumption
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not require the the signer to maintain any state, and can be proven secure against ...
Ronald Cramer, Victor Shoup
BIOSIG
2008
159views Biometrics» more  BIOSIG 2008»
15 years 2 months ago
Template Protection for PCA-LDA-based 3D Face Recognition Systems
: Authentication based on biometrics became significantly important over the last years. Privacy and security concerns arise by the extensive deployment of biometrics. The used bio...
Daniel Hartung
83
Voted
MM
2005
ACM
116views Multimedia» more  MM 2005»
15 years 6 months ago
Affective multimodal human-computer interaction
Social and emotional intelligence are aspects of human intelligence that have been argued to be better predictors than IQ for measuring aspects of success in life, especially in s...
Maja Pantic, Nicu Sebe, Jeffrey F. Cohn, Thomas S....
EUROCRYPT
2010
Springer
15 years 5 months ago
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Ka...