Sciweavers

74 search results - page 4 / 15
» Comparing two pairing-based aggregate signature schemes
Sort
View
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
15 years 3 months ago
Generic Security-Amplifying Methods of Ordinary Digital Signatures
We describe two new paradigms on how to obtain ordinary signatures that are secure against existential forgery under adaptively chosen message attacks (fully-secure, in short), fro...
Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong
JNW
2006
149views more  JNW 2006»
14 years 9 months ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo
DASFAA
2006
IEEE
134views Database» more  DASFAA 2006»
15 years 3 months ago
Authentication of Outsourced Databases Using Signature Aggregation and Chaining
Database outsourcing is an important emerging trend which involves data owners delegating their data management needs to an external service provider. Since a service provider is a...
Maithili Narasimha, Gene Tsudik
CIVR
2003
Springer
107views Image Analysis» more  CIVR 2003»
15 years 2 months ago
A Novel Scheme for Video Similarity Detection
In this paper, a new two-phase scheme for video similarity detection is proposed. For each video sequence, we extract two kinds of signatures with different granularities: coarse ...
Chu-Hong Hoi, Wei Wang, Michael R. Lyu
INFOCOM
2007
IEEE
15 years 3 months ago
PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks
Abstract— Providing efficient data aggregation while preserving data privacy is a challenging problem in wireless sensor networks research. In this paper, we present two privacy...
Wenbo He, Xue Liu, Hoang Nguyen, Klara Nahrstedt, ...