Sciweavers

2601 search results - page 148 / 521
» Secure Rewarding Schemes
Sort
View
ICC
2007
IEEE
136views Communications» more  ICC 2007»
15 years 7 months ago
SAMcast - A Scalable, Secure and Authenticated Multicast Protocol for Large Scale P2P Networks
Overlay networks have shown tremendous potential in solving large scale data dissemination problem by employing peer-to-peer communication protocols. These networks, however, have ...
Waseem Ahmad, Ashfaq A. Khokhar
109
Voted
ICIAP
2005
ACM
16 years 3 months ago
Security Enhancement of Visual Hashes Through Key Dependent Wavelet Transformations
Parameterized wavelet filters and wavelet packet subband structures are discussed to be used as key dependent wavelet transforms in order to enhance the security of wavelet based h...
Albert Meixner, Andreas Uhl
ACNS
2009
Springer
158views Cryptology» more  ACNS 2009»
15 years 9 months ago
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
We propose a new variant of the Cramer-Shoup KEM (key encapsulation mechanism). The proposed variant is more efficient than the original Cramer-Shoup KEM scheme in terms of public...
Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianyi...
ICC
2007
IEEE
15 years 9 months ago
Security Flaws in Kuribayashi-Tanaka Fingerprinting Protocol
— The buyer-seller watermarking protocol enables a seller to successfully identify at least one traitor from a pirated copy, while prevent the seller from framing an innocent buy...
Yongdong Wu
IH
2005
Springer
15 years 8 months ago
Information-Theoretic Analysis of Security in Side-Informed Data Hiding
Abstract. In this paper a novel theoretical security analysis will be presented for data hiding methods with side-information, based on Costa’s dirty paper scheme. We quantify th...
Luis Pérez-Freire, Pedro Comesaña, F...