Sciweavers

5891 search results - page 82 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
IPPS
2009
IEEE
15 years 8 months ago
Combating side-channel attacks using key management
Embedded devices are widely used in military and civilian operations. They are often unattended, publicly accessible, and thus vulnerable to physical capture. Tamper-resistant mod...
Donggang Liu, Qi Dong
ICIP
2003
IEEE
16 years 3 months ago
Dither-based secure image hashing using distributed coding
We propose an image hashing algorithm that is based on distributed compression principles. The algorithm assumes the availability of a robust feature vector extracted from the ima...
Mark Johnson, Kannan Ramchandran
ACISP
2005
Springer
15 years 7 months ago
Two Improved Partially Blind Signature Schemes from Bilinear Pairings
A blind signature scheme is a protocol for obtaining a digital signature from a signer, but the signer can neither learn the messages he/she sign nor the signatures the recipients ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...
AGENTS
2001
Springer
15 years 6 months ago
Argumentation as distributed constraint satisfaction: applications and results
Conflict resolution is a critical problem in distributed and collaborative multi-agent systems. Negotiation via argumentation (NVA), where agents provide explicit arguments or ju...
Hyuckchul Jung, Milind Tambe, Shriniwas Kulkarni
UC
2007
Springer
15 years 7 months ago
Quantum Authenticated Key Distribution
Quantum key distributionalgorithmsuse a quantum communicationchannel with quantum information and a classical communication channel for binary information. The classical channel, ...
Naya Nagy, Selim G. Akl