Sciweavers

1769 search results - page 167 / 354
» Cryptography
Sort
View
128
Voted
CSFW
2007
IEEE
15 years 10 months ago
Computationally Sound Mechanized Proofs of Correspondence Assertions
We present a new mechanized prover for showing correspondence assertions for cryptographic protocols in the computational model. Correspondence assertions are useful in particular...
Bruno Blanchet
ICMCS
2007
IEEE
164views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Constructing Secure Content-Dependent Watermarking Scheme using Homomorphic Encryption
Content-dependent watermarking (CDWM) has been proposed as a solution to overcome the potential estimation attack aiming to recover and remove the watermark from the host signal. ...
Zhi Li, Xinglei Zhu, Yong Lian, Qibin Sun
117
Voted
ICMCS
2007
IEEE
211views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Context-Based Scalable Coding and Representation of High Resolution Art Pictures for Remote Data Access
EROS is the largest database in the world of high resolution art pictures. The TSAR project is designed to open it in a secure, efficient and user-friendly way that involves cryp...
Marie Babel, Olivier Déforges, Laurent B&ea...
PDP
2007
IEEE
15 years 9 months ago
Parallel-External Computation of the Cycle Structure of Invertible Cryptographic Functions
We present an algorithm to compute the cycle structure of large directed graphs where each node has exactly one outgoing edge. Such graphs appear as state diagrams of finite stat...
Andreas Beckmann, Jorg Keller
147
Voted
ACNS
2007
Springer
129views Cryptology» more  ACNS 2007»
15 years 9 months ago
Gradually Convertible Undeniable Signatures
In 1990, Boyar, Chaum, Damg˚ard and Pedersen introduced convertible undeniable signatures which limit the self-authenticating property of digital signatures but can be converted b...
Laila El Aimani, Damien Vergnaud