Sciweavers

2108 search results - page 24 / 422
» Encrypted
Sort
View
106
Voted
CMS
2006
15 years 2 months ago
Selective Encryption for Hierarchical MPEG
Selective encryption of visual data and especially MPEG has attracted a considerable number of researchers in recent years. Scalable visual formats are offering additional function...
Heinz Hofbauer, Thomas Stütz, Andreas Uhl
93
Voted
DGO
2003
118views Education» more  DGO 2003»
15 years 2 months ago
Enabling Email Confidentiality through the use of Opportunistic Encryption
Software for encrypting email messages has been widely available for more than 15 years, but the emailusing public has failed to adopt secure messaging. This failure can be explai...
Simson L. Garfinkel
111
Voted
JCP
2006
94views more  JCP 2006»
15 years 22 days ago
Broadcast Encryption Using Probabilistic Key Distribution and Applications
A family of novel broadcast encryption schemes based on probabilistic key pre-distribution are proposed, that enable multiple sources to broadcast secrets, without the use of asymm...
Mahalingam Ramkumar
103
Voted
CIS
2005
Springer
15 years 6 months ago
Multimedia Digital Right Management Using Selective Scrambling for Mobile Handset
Abstract. In this paper, we propose a novel solution called joint encryption, in which audio and video data are scrambled efficiently by using modified phase scrambling, modified...
Goo-Rak Kwon, Tea-Young Lee, Kyoung-Ho Kim, Jae-Do...
CRYPTO
2005
Springer
97views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
Generic Transformation for Scalable Broadcast Encryption Schemes
Broadcast encryption schemes allow a message sender to broadcast an encrypted data so that only legitimate receivers decrypt it. Because of the intrinsic nature of one-to-many comm...
Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim