Sciweavers

1769 search results - page 117 / 354
» Cryptography
Sort
View
ICIP
2005
IEEE
16 years 5 months ago
Localization and security enhancement of block-based image authentication
Most block-based image authentication techniques that are presented in the literature sacrifice localization accuracy in order to resist vector quantization (VQ) counterfeiting att...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
CHES
2009
Springer
230views Cryptology» more  CHES 2009»
16 years 3 months ago
Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves
Abstract. This paper presents a design-space exploration of an applicationspecific instruction-set processor (ASIP) for the computation of various cryptographic pairings over Barre...
David Kammler, Diandian Zhang, Dominik Auras, Gerd...
TCC
2009
Springer
146views Cryptology» more  TCC 2009»
16 years 3 months ago
An Optimally Fair Coin Toss
We address one of the foundational problems in cryptography: the bias of coin-flipping protocols. Coin-flipping protocols allow mutually distrustful parties to generate a common u...
Tal Moran, Moni Naor, Gil Segev
116
Voted
PODS
2005
ACM
119views Database» more  PODS 2005»
16 years 3 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
114
Voted
ESORICS
2002
Springer
16 years 2 months ago
Computational Probabilistic Non-interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
Michael Backes, Birgit Pfitzmann