Sciweavers

2601 search results - page 101 / 521
» Secure Rewarding Schemes
Sort
View
PROVSEC
2009
Springer
15 years 9 months ago
Anonymous Signatures Revisited
Abstract. We revisit the notion of the anonymous signature, first formalized by Yang, Wong, Deng and Wang [12], and then further developed by Fischlin [6] and Zhang and Imai [13]. ...
Vishal Saraswat, Aaram Yun
CISIM
2007
IEEE
15 years 9 months ago
Universally Composable Key-Evolving Signature
The standard digital signature scheme can be easily subject to key exposure problem In order to overcome this problem; a feasible and effective approach is employed by key-evolving...
Jin Zhou, Yuefei Zhu, TingMao Chang, YaJuan Zhang
PODC
2010
ACM
15 years 3 months ago
Brief announcement: swarming secrets
We present information-theoretically secure schemes for sharing and modifying secrets among a dynamic swarm of computing devices. The schemes support an unlimited number of change...
Shlomi Dolev, Juan A. Garay, Niv Gilboa, Vladimir ...
WWW
2004
ACM
16 years 3 months ago
Copyright protection on the web: a hybrid digital video watermarking scheme
Video is one of the most popular data shared in the Web, and the protection of video copyright is of vast interest. In this paper, we present a comprehensive approach for protecti...
Pat Pik-Wah Chan, Michael R. Lyu, Roland T. Chin
CCS
2006
ACM
15 years 6 months ago
An efficient broadcast authentication scheme in wireless sensor networks
A broadcast authentication mechanism is important in wireless sensor networks, assuring receivers of a packet's validity. To provide authentication, some researchers utilize ...
Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, ...