Sciweavers

2601 search results - page 36 / 521
» Secure Rewarding Schemes
Sort
View
ISCAS
2008
IEEE
100views Hardware» more  ISCAS 2008»
15 years 6 months ago
On the security of a class of image encryption schemes
— Recently four chaos-based image encryption schemes were proposed. Essentially, the four schemes can be classified into one class, which is composed of two basic parts: permuta...
Chengqing Li, Guanrong Chen
ACNS
2003
Springer
131views Cryptology» more  ACNS 2003»
15 years 5 months ago
On the Security of Two Threshold Signature Schemes with Traceable Signers
A (t, n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members, while any t−1 or less members cannot do the same th...
Guilin Wang, Xiaoxi Han, Bo Zhu
GLOBECOM
2007
IEEE
15 years 6 months ago
A Secure Data Transmission Scheme for Mobile Ad Hoc Networks
— We propose a secure data transmission scheme that takes advantage of node mobility. The scheme is based on the observation that due to mobility, messages sent at different time...
Qunwei Zheng, Xiaoyan Hong, Jun Liu, Lei Tang
INFORMATICALT
2010
170views more  INFORMATICALT 2010»
14 years 9 months ago
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original sign...
Hu Xiong, Fagen Li, Zhiguang Qin
ASIACRYPT
2006
Springer
15 years 3 months ago
Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution
We consider the problem of cheating in secret sharing schemes, cheating in which individuals submit forged shares in the secret reconstruction phase in an effort to make another pa...
Satoshi Obana, Toshinori Araki