Sciweavers

2601 search results - page 29 / 521
» Secure Rewarding Schemes
Sort
View
IJISEC
2008
69views more  IJISEC 2008»
14 years 11 months ago
A survey of certificateless encryption schemes and security models
Abstract This paper surveys the literature on certificateless encryption schemes. In particular, we examine the large number of security models that have been proposed to prove the...
Alexander W. Dent
SASN
2005
ACM
15 years 5 months ago
A key pre-distribution scheme for secure sensor networks using probability density function of node deployment
Pairwise key establishment is a fundamental service provided in secure sensor networks. However, due to resource constraints, establishing pairwise keys is not a trivial task. Rec...
Takashi Ito, Hidenori Ohta, Nori Matsuda, Takeshi ...
IJNSEC
2011
143views more  IJNSEC 2011»
14 years 6 months ago
Probable Security Proof of A Blind Signature Scheme over Braid Groups
In this paper, we reinvestigate the security analysis of blind signature scheme over braid groups proposed by Verma in 2008. A blind signature scheme is a cryptographic primitive ...
Girraj Kumar Verma
IJNSEC
2010
143views more  IJNSEC 2010»
14 years 6 months ago
A New Secure Remote User Authentication Scheme with Smart Cards
Remote user authentication scheme is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. These types of schemes ...
Manoj Kumar
ICASSP
2008
IEEE
15 years 6 months ago
On the tradeoff between security and Robustness of the Trellis Coded Quantization scheme
The steganographic security in the Cachin’s work is defined as the statistical invisibility between the host signal and its marked version. At contrary, the robustness to an at...
Sofiane Braci, Rémy Boyer, Claude Delpha