Sciweavers

402 search results - page 19 / 81
» Cryptosystems using Linear Groups
Sort
View
SIGCOMM
1998
ACM
15 years 2 months ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam
IJNSEC
2006
107views more  IJNSEC 2006»
14 years 10 months ago
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero know...
Fagen Li, Xiangjun Xin, Yupu Hu
CORR
2010
Springer
100views Education» more  CORR 2010»
14 years 10 months ago
Fast-Group-Decodable STBCs via Codes over GF(4)
Abstract--In this paper we construct low ML decoding complexity STBCs by using the Pauli matrices as linear dispersion matrices. In this case the Hurwitz-Radon orthogonality condit...
Natarajan Lakshmi Prasad, B. Sundar Rajan
CORR
2008
Springer
187views Education» more  CORR 2008»
14 years 10 months ago
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
Recent emergence of electronic culture uplifts healthcare facilities to a new era with the aid of wireless sensor network (WSN) technology. Due to the sensitiveness of medical data...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
CORR
2006
Springer
119views Education» more  CORR 2006»
14 years 10 months ago
An approach to RAID-6 based on cyclic groups of a prime order
As the size of data storing arrays of disks grows, it becomes vital to protect data against double disk failures. An economic way of providing such protection consists of adding tw...
R. Jackson, D. Rumynin, O. Zaboronski