Sciweavers

2237 search results - page 297 / 448
» On the Security of Random Sources
Sort
View
155
Voted
IJWIN
2006
209views more  IJWIN 2006»
15 years 5 months ago
On Connected Multiple Point Coverage in Wireless Sensor Networks
Abstract-- We consider a wireless sensor network consisting of a set of sensors deployed randomly. A point in the monitored area is covered if it is within the sensing range of a s...
Shuhui Yang, Fei Dai, Mihaela Cardei, Jie Wu, Floy...
INFORMATICALT
2006
93views more  INFORMATICALT 2006»
15 years 5 months ago
Identity Based Multisignatures
Abstract. This paper presents identity based serial and parallel multisignature schemes using bilinear pairings. Our serial multisignature scheme requires a forced verification at ...
Raju Gangishetti, M. Choudary Gorantla, Manik Lal ...
PRL
2006
144views more  PRL 2006»
15 years 5 months ago
Astronomical image restoration using an improved anisotropic diffusion
Images secured from an astronomical telescope usually suffer from blur and from interference that scientists refer to as ``noise''. Therefore, good image restoration tec...
Shin-Min Chao, Du-Ming Tsai
ACNS
2009
Springer
147views Cryptology» more  ACNS 2009»
15 years 3 months ago
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions
In this paper, we propose a notion of threshold tag-based encryption schemes that simplifies the notion of threshold identity-based encryption schemes, and we show a conversion fro...
Seiko Arita, Koji Tsurudome
CANS
2009
Springer
276views Cryptology» more  CANS 2009»
15 years 3 months ago
Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model
Group signatures allow users to anonymously sign messages in the name of a group. Membership revocation has always been a critical issue in such systems. In 2004, Boneh and Shacham...
Benoît Libert, Damien Vergnaud