Sciweavers

2601 search results - page 231 / 521
» Secure Rewarding Schemes
Sort
View
123
Voted
CRYPTO
2010
Springer
186views Cryptology» more  CRYPTO 2010»
15 years 4 months ago
Additively Homomorphic Encryption with d-Operand Multiplications
The search for encryption schemes that allow to evaluate functions (or circuits) over encrypted data has attracted a lot of attention since the seminal work on this subject by Rive...
Carlos Aguilar Melchor, Philippe Gaborit, Javier H...
INFORMATICALT
2006
93views more  INFORMATICALT 2006»
15 years 3 months ago
Identity Based Multisignatures
Abstract. This paper presents identity based serial and parallel multisignature schemes using bilinear pairings. Our serial multisignature scheme requires a forced verification at ...
Raju Gangishetti, M. Choudary Gorantla, Manik Lal ...
117
Voted
IJNSEC
2007
128views more  IJNSEC 2007»
15 years 3 months ago
LFSR-based Signatures with Message Recovery
In order to reduce key sizes and bandwidth, several LFSRbased (linear feedback shift register) public key cryptosystems and signature schemes have been proposed. Digital signature...
Xiangxue Li, Dong Zheng, Kefei Chen
123
Voted
CDC
2008
IEEE
197views Control Systems» more  CDC 2008»
15 years 10 months ago
Dynamic spectrum access policies for cognitive radio
—We study the problem of dynamic spectrum sensing and access in cognitive radio systems as a partially observed Markov decision process (POMDP). A group of cognitive users cooper...
Jayakrishnan Unnikrishnan, Venugopal V. Veeravalli
138
Voted
ICPADS
2006
IEEE
15 years 9 months ago
A Distributed Algorithm for Sharing Web Cache Disk Capacity
A decentralized game theoretic framework applied to Web caching is discussed. The interaction of multiple clients with a caching server is modeled as a non-cooperative game, in wh...
George Alyfantis, Stathes Hadjiefthymiades, Lazaro...