Sciweavers

2601 search results - page 222 / 521
» Secure Rewarding Schemes
Sort
View
INFORMATICALT
2010
99views more  INFORMATICALT 2010»
15 years 2 months ago
Security Analysis of Asymmetric Cipher Protocol Based on Matrix Decomposition Problem
The asymmetric cipher protocol, based on decomposition problem in matrix semiring M over semiring of natural numbers N is presented. The security of presented cipher protocol is ba...
Andrius Raulynaitis, Eligijus Sakalauskas, Saulius...
132
Voted
EUROCRYPT
2010
Springer
15 years 8 months ago
Adaptive Trapdoor Functions and Chosen-Ciphertext Security
We introduce the notion of adaptive trapdoor functions (ATDFs); roughly, ATDFs remain one-way even when the adversary is given access to an inversion oracle. Our main application ...
Eike Kiltz, Payman Mohassel, Adam O'Neill
139
Voted
BIOID
2008
183views Biometrics» more  BIOID 2008»
15 years 5 months ago
POLYBIO: Multimodal Biometric Data Acquisition Platform and Security System
Biometrics is the automated method of recognizing a person based on a physiological or behavioural characteristic. Biometric technologies are becoming the foundation of an extensiv...
Anastasis Kounoudes, Nicolas Tsapatsoulis, Zenonas...
132
Voted
DBSEC
2010
162views Database» more  DBSEC 2010»
15 years 5 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
104
Voted
CORR
2010
Springer
112views Education» more  CORR 2010»
15 years 3 months ago
Data security in mobile devices by geo locking
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and ...
M. Prabu Kumar, K. Praneesh Kumar Yadav