Sciweavers

250 search results - page 41 / 50
» Improving the Exact Security of Digital Signature Schemes
Sort
View
ECCC
2007
185views more  ECCC 2007»
14 years 11 months ago
Trapdoors for Hard Lattices and New Cryptographic Constructions
We show how to construct a variety of “trapdoor” cryptographic tools assuming the worst-case hardness of standard lattice problems (such as approximating the length of the sho...
Craig Gentry, Chris Peikert, Vinod Vaikuntanathan
IAJIT
2010
112views more  IAJIT 2010»
14 years 10 months ago
Variable Rate Steganography in Gray Scale Digital Images Using Neighborhood Pixel Information
: Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Security has always been a major concern since time im...
Moazzam Hossain, Sadia Al Haque, Farhana Sharmin
WAIFI
2010
Springer
158views Mathematics» more  WAIFI 2010»
14 years 9 months ago
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
Abstract. We focus on the implementation and security aspects of cryptographic protocols that use Type 1 and Type 4 pairings. On the implementation front, we report improved timing...
Sanjit Chatterjee, Darrel Hankerson, Alfred Meneze...
SACMAT
2004
ACM
15 years 5 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
SASN
2006
ACM
15 years 5 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du