Sciweavers

2601 search results - page 260 / 521
» Secure Rewarding Schemes
Sort
View
ACNS
2005
Springer
167views Cryptology» more  ACNS 2005»
15 years 9 months ago
Identity Based Encryption Without Redundancy
This paper presents a first example of secure identity based encryption scheme (IBE) without redundancy in the sense of Phan and Pointcheval. This modification of the Boneh-Frank...
Benoît Libert, Jean-Jacques Quisquater
ASIACRYPT
2005
Springer
15 years 9 months ago
Universally Anonymizable Public-Key Encryption
Abstract. We first propose the notion of universally anonymizable publickey encryption. Suppose that we have the encrypted data made with the same security parameter, and that the...
Ryotaro Hayashi, Keisuke Tanaka
MMSEC
2004
ACM
209views Multimedia» more  MMSEC 2004»
15 years 9 months ago
Robust DWT-SVD domain image watermarking: embedding data in all frequencies
Protection of digital multimedia content has become an increasingly important issue for content owners and service providers. As watermarking is identified as a major technology t...
Emir Ganic, Ahmet M. Eskicioglu
COMPSAC
2009
IEEE
15 years 7 months ago
Tamper Resistance for Software Defined Radio Software
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When designing and developing security solutions for SDR sof...
Shucai Xiao, Jung-Min Park, Yanzhu Ye
SP
2002
IEEE
226views Security Privacy» more  SP 2002»
15 years 3 months ago
Dynamic load balancing of SAMR applications on distributed systems
Dynamic load balancing(DLB) for parallel systems has been studied extensively; however, DLB for distributed systems is relatively new. To efficiently utilize computing resources p...
Zhiling Lan, Valerie E. Taylor, Greg Bryan