Sciweavers

2108 search results - page 99 / 422
» Encrypted
Sort
View
ICIP
2008
IEEE
15 years 9 months ago
A novel video encryption technique based on secret sharing
The rapid growth of the Internet and digitized content made video distribution simpler. Hence the need for video data protection is on the rise. In this paper, we propose a secure...
Chigullapally Narsimha Raju, Ganugula Umadevi, Kan...
CIS
2007
Springer
15 years 9 months ago
SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks
ct This paper proposes a Secure Encrypted-data Aggregation (SEA) scheme in mobile wireless sensor networks (MWSN) environment. Our design for data aggregation eliminates redundant ...
Shih-I Huang, Shiuhpyng Shieh
ACRI
2004
Springer
15 years 8 months ago
Block Encryption Using Reversible Cellular Automata
Cellular automata (CA) are highly parallel and discrete dynamical systems, whose behavior is completely specified in terms of a local relation. They were successfully applied for s...
Marcin Seredynski, Pascal Bouvry
CRYPTO
2004
Springer
138views Cryptology» more  CRYPTO 2004»
15 years 8 months ago
Secure Identity Based Encryption Without Random Oracles
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model. Selective identity secure IBE is a slightly w...
Dan Boneh, Xavier Boyen
PDCAT
2004
Springer
15 years 8 months ago
Tamper Resistant Software by Integrity-Based Encryption
There are many situations in which it is desirable to protect a piece of software from illegitimate tampering once it gets distributed to the users. Protecting the software code me...
Jaewon Lee, Heeyoul Kim, Hyunsoo Yoon