Sciweavers

5752 search results - page 408 / 1151
» Informative Labeling Schemes
Sort
View
CCR
2000
101views more  CCR 2000»
15 years 4 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
160
Voted
TMC
2010
109views more  TMC 2010»
15 years 3 months ago
Uncertainty Modeling and Reduction in MANETs
—Evaluating and quantifying trust stimulates collaboration in mobile ad hoc networks (MANETs). Many existing reputation systems sharply divide the trust value into right or wrong...
Feng Li, Jie Wu
SDMW
2010
Springer
15 years 2 months ago
Computationally Efficient Searchable Symmetric Encryption
Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little ...
Peter van Liesdonk, Saeed Sedghi, Jeroen Doumen, P...
TMI
2010
164views more  TMI 2010»
14 years 11 months ago
Robust Reconstruction of MRSI Data Using a Sparse Spectral Model and High Resolution MRI Priors
We introduce a novel algorithm to address the challenges in magnetic resonance (MR) spectroscopic imaging. In contrast to classical sequential data processing schemes, the proposed...
Ramin Eslami, Mathews Jacob
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
15 years 11 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev