Sciweavers

1769 search results - page 151 / 354
» Cryptography
Sort
View
101
Voted
ENTCS
2006
138views more  ENTCS 2006»
15 years 3 months ago
Model Checking Russian Cards
We implement a specific protocol for bit exchange among card-playing agents in three different state-of-the-art epistemic model checkers and compare the results. Key words: Crypto...
Hans P. van Ditmarsch, Wiebe van der Hoek, Ron van...
CN
2007
111views more  CN 2007»
15 years 3 months ago
Advances in smart cards
Since the turn of the century, smart card technology has pushed its borders both on the high end to integrate new functionalities (e.g., networking) and on the low end to adapt to...
Josep Domingo-Ferrer, Joachim Posegga, Francesc Se...
116
Voted
JISE
2008
143views more  JISE 2008»
15 years 3 months ago
A Geometry-Based Secret Image Sharing Approach
This paper solves the visual cryptography problem by the Blakley scheme that is a geometry-based secret sharing strategy. We first partition the protected image into non-overlappi...
Chien-Chang Chen, Wen-Yin Fu
121
Voted
JNW
2008
103views more  JNW 2008»
15 years 3 months ago
Key Revocation System for DNSSEC
Abstract-- The Domain Name System (DNS) is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions...
Gilles Guette
96
Voted
JOC
2006
80views more  JOC 2006»
15 years 3 months ago
Elliptic Curves with Low Embedding Degree
Motivated by the needs of the pairing based cryptography, Miyaji, Nakabayashi and Takano have suggested a construction of so-called MNT elliptic curves with low embedding degree. ...
Florian Luca, Igor Shparlinski