Sciweavers

2108 search results - page 174 / 422
» Encrypted
Sort
View
91
Voted
JOC
2008
64views more  JOC 2008»
15 years 3 months ago
Generic Constructions of Identity-Based and Certificateless KEMs
We extend the concept of key encapsulation mechanisms to the primitives of ID-based and certificateless encryption. We show that the natural combination of ID-KEMs or CL-KEMs with ...
Kamel Bentahar, Pooya Farshim, John Malone-Lee, Ni...
46
Voted
IBMRD
2007
47views more  IBMRD 2007»
15 years 3 months ago
Cell Broadband Engine processor vault security architecture
    Current data protection technologies such as those based on public‐key encryption and broadcast  encryption  focus  on  the  secure  control  and  prote...
Kanna Shimizu, H. Peter Hofstee, John S. Liberty
IWSEC
2010
Springer
15 years 2 months ago
Publishing Upper Half of RSA Decryption Exponent
In the perspective of RSA, given small encryption exponent e (e.g., e = 216 + 1), the top half of the decryption exponent d can be narrowed down within a small search space. This f...
Subhamoy Maitra, Santanu Sarkar, Sourav Sengupta
151
Voted
ICICS
2010
Springer
15 years 1 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
161
Voted
MM
2004
ACM
97views Multimedia» more  MM 2004»
15 years 9 months ago
Security of human video objects by incorporating a chaos-based feedback cryptographic scheme
Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. However most cryptographic systems deal with multimedia...
Paraskevi K. Tzouveli, Klimis S. Ntalianis, Stefan...