Sciweavers

2601 search results - page 174 / 521
» Secure Rewarding Schemes
Sort
View
110
Voted
TIT
2011
112views more  TIT 2011»
14 years 10 months ago
On the Secure Degrees of Freedom of Relaying With Half-Duplex Feedback
—Secure communication protocols over a single-relay system in the presence of a multiple-antenna eavesdropper are investigated. When there is no direct link between the source an...
Thanh Tùng Kim, H. Vincent Poor
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
15 years 10 months ago
Adaptive-ID Secure Revocable Identity-Based Encryption
Abstract. Identity-Based Encryption (IBE) offers an interesting alternative to PKI-enabled encryption as it eliminates the need for digital certificates. While revocation has bee...
Benoît Libert, Damien Vergnaud
SOCA
2007
IEEE
15 years 9 months ago
Mobile Agent and Web Service Integration Security Architecture
Mobile agent technology and Web Service technology compensate each other and play very important roles in eservice applications. The mechanism of Web Services technology naturally...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
137
Voted
IWDW
2004
Springer
15 years 8 months ago
Watermarking Attack: Security of WSS Techniques
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is studied here in adopting a cryptanalysis point of view. The security is proport...
François Cayre, Caroline Fontaine, Teddy Fu...
125
Voted
JCS
2010
112views more  JCS 2010»
15 years 1 months ago
Inductive trace properties for computational security
Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...