Sciweavers

2108 search results - page 200 / 422
» Encrypted
Sort
View
109
Voted
TCSV
2008
111views more  TCSV 2008»
15 years 3 months ago
Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion
Recently, a novel image scrambling (i.e., encryption) scheme without bandwidth expansion was proposed based on two-dimensional (2-D) discrete prolate spheroidal sequences (DPSS). ...
Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Ch...
JSS
2007
79views more  JSS 2007»
15 years 3 months ago
Security problems with improper implementations of improved FEA-M
This paper reports security problems with improper implementations of an improved version of FEA-M (fast encryption algorithm for multimedia). It is found that an implementation-d...
Shujun Li, Kwok-Tung Lo
SAJ
2002
97views more  SAJ 2002»
15 years 3 months ago
PrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Frans A. Lategan, Martin S. Olivier
CSI
2008
82views more  CSI 2008»
15 years 3 months ago
Efficient and secure protocol in fair document exchange
This paper presents a new fair document exchange protocol based on bilinear pairing with off-line trusted third party (TTP). In such a fair exchange scenario, each party owns a va...
Xiaohui Liang, Zhenfu Cao, Rongxing Lu, Liuquan Qi...
IEEEARES
2010
IEEE
15 years 2 months ago
A New DRM Architecture with Strong Enforcement
—We propose a new DRM architecture that utilizes a two-step enforcement process to enable strong security even in the case of a compromised DRM viewer. This is achieved by using ...
Sascha Müller, Stefan Katzenbeisser