Sciweavers

2108 search results - page 150 / 422
» Encrypted
Sort
View
TISSEC
2008
77views more  TISSEC 2008»
15 years 3 months ago
Provably Secure Timed-Release Public Key Encryption
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan...
TISSEC
2008
68views more  TISSEC 2008»
15 years 3 months ago
Dynamic access-control policies on XML encrypted data
Luc Bouganim, François Dang Ngoc, Philippe ...
JACIII
2007
96views more  JACIII 2007»
15 years 3 months ago
Access Control and Scalable Encryption Using a Stream Cipher for JPEG 2000 Encoded Images
Ayman Haggag, Mohamed Ghoneim, Jianming Lu, Takash...
CORR
2004
Springer
81views Education» more  CORR 2004»
15 years 3 months ago
Encryption Schemes using Finite Frames and Hadamard Arrays
Ryan Harkins, Eric Weber, Andrew Westmeyer
121
Voted
CSI
2004
110views more  CSI 2004»
15 years 3 months ago
A novel three-party encrypted key exchange protocol
The key exchange protocol is one of the most elegant ways of establishing secure communication between pair of users by using a session key. The passwords are of low entropy, henc...
Chin-Chen Chang, Ya-Fen Chang