Sciweavers

24188 search results - page 243 / 4838
» Computing on Encrypted Data
Sort
View
136
Voted
ICPR
2006
IEEE
16 years 4 months ago
Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme
We propose a novel biometrics cryptosystem where one can send and receive secure information using just the fingerprints. This cryptosystem is a judicious blend of the asymmetric ...
Abhishek Nagar, Santanu Chaudhury
120
Voted
CCECE
2009
IEEE
15 years 10 months ago
An ultra compact block cipher for serialized architecture implementations
In this paper, we present a new block cipher, referred as PUFFIN2, that is designed to be used with applications requiring very low circuit area. PUFFIN2 is designed to be impleme...
Cheng Wang, Howard M. Heys
171
Voted
PDCAT
2009
Springer
15 years 10 months ago
Bifrost : A Novel Anonymous Communication System with DHT
An immense amount of information is processed on the Internet due to its spread, increasing the severity of such problems as the disclosure of personal information; privacy protec...
Masaki Kondo, Shoichi Saito, Kiyohisa Ishiguro, Hi...
QUANTUMCOMM
2009
Springer
15 years 10 months ago
The Case for Quantum Key Distribution
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructur...
Douglas Stebila, Michele Mosca, Norbert Lütke...
IWNAS
2008
IEEE
15 years 10 months ago
Event-based Trust Framework Model in Wireless Sensor Networks
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encry...
Haiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Ga...