Sciweavers

2601 search results - page 132 / 521
» Secure Rewarding Schemes
Sort
View
JDCTA
2010
125views more  JDCTA 2010»
14 years 10 months ago
Reliable Information Transmission: A Chaotic Sequence-Based Authentication Scheme for Radio Environment Maps Enabled Cognitive R
With the intent of efficient occupying under-utilized spectrum, radio environment map (REM) based cognitive radio (CR) networking is proposed to facilitate the distributed spectru...
Li Zhang, Guoxin Zheng
115
Voted
TCC
2010
Springer
166views Cryptology» more  TCC 2010»
16 years 1 days ago
Public-Key Encryption Schemes with Auxiliary Inputs
We construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one t...
Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kala...
ICMCS
2006
IEEE
187views Multimedia» more  ICMCS 2006»
15 years 9 months ago
A Nonnegative Matrix Factorization Scheme for Digital Image Watermarking
We present a new scheme for digital watermarking and secure copyright protection of digital images using nonnegative matrix factorization and singular value decomposition approach...
Mohammadreza Ghaderpanah, A. Ben Hamza
CORR
2010
Springer
138views Education» more  CORR 2010»
15 years 3 months ago
The Digital Signature Scheme MQQ-SIG
Abstract: This document contains the Intellectual Property Statement and the technical description of the MQQ-SIG - a new public key digital signature scheme. The complete scientif...
Danilo Gligoroski, Svein Johan Knapskog, Smile Mar...
CRYPTO
2005
Springer
144views Cryptology» more  CRYPTO 2005»
15 years 8 months ago
Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes
We investigate several previously suggested scenarios of instantiating random oracles (ROs) with “realizable” primitives in cryptographic schemes. As candidates for such “in...
Alexandra Boldyreva, Marc Fischlin