Sciweavers

2108 search results - page 27 / 422
» Encrypted
Sort
View
58
Voted
ICIP
2002
IEEE
16 years 2 months ago
On the security of an image encryption method
The security of digital images attracts much attention recently, and many different image encryption methods have been proposed. In 1999, J.-C. Yen and J.-I. Guo proposed a novel ...
Shujun Li, Xuan Zheng
115
Voted
CODCRY
2009
Springer
111views Cryptology» more  CODCRY 2009»
15 years 7 months ago
On the Impossibility of Strong Encryption Over
We give two impossibility results regarding strong encryption over an infinite enumerable domain. The first one relates to statistically secure one-time encryption. The second on...
Raphael C.-W. Phan, Serge Vaudenay
PROVSEC
2007
Springer
15 years 6 months ago
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a threshold t, and then encrypts a message by using the public keys of all the recei...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...
93
Voted
ISM
2006
IEEE
111views Multimedia» more  ISM 2006»
15 years 6 months ago
Compressed-Domain Encryption of Adapted H.264 Video
Commercial service providers and secret services yearn to employ the available environment for conveyance of their data in a secured way. In order to encrypt or to ensure personal...
Razib Iqbal, Shervin Shirmohammadi, Abdulmotaleb E...
ESORICS
2004
Springer
15 years 6 months ago
Hindering Eavesdropping via IPv6 Opportunistic Encryption
This paper presents an opportunistic encryption scheme strictly layered on top of IPv6. Assuming that a node needs to send data toward another node, our proposal enables the dynami...
Claude Castelluccia, Gabriel Montenegro, Julien La...