Sciweavers

2601 search results - page 47 / 521
» Secure Rewarding Schemes
Sort
View
CRYPTO
2005
Springer
171views Cryptology» more  CRYPTO 2005»
15 years 5 months ago
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes
Error correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, we study the connections between codes, matroids, and a s...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
ICIP
2009
IEEE
16 years 27 days ago
Security Evaluation Of Informed Watermarking Schemes
In this paper, security evaluation of an important watermarking class based on quantization is given. Theoretical developments and practical simulations are used to measure the se...
PERVASIVE
2004
Springer
15 years 5 months ago
A Fault-Tolerant Key-Distribution Scheme for Securing Wireless Ad Hoc Networks
We propose a novel solution for securing wireless ad-hoc networks. Our goal is to provide secure key exchange in the presence of device failures and denial-of-service attacks. The ...
Arno Wacker, Timo Heiber, Holger Cermann, Pedro Jo...
AMC
2005
124views more  AMC 2005»
14 years 11 months ago
The security of a strong proxy signature scheme with proxy signer privacy protection
In 1996, Mambo et al. first introduced the concept of a proxy signature scheme, and discussed the delegation of the signing capability to a proxy signer. In 2001, Lee et al. const...
Narn-Yih Lee, Ming-Feng Lee
ACNS
2006
Springer
117views Cryptology» more  ACNS 2006»
15 years 5 months ago
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
We study the influence of collision-finding attacks on the security of time-stamping schemes. We distinguish between client-side hash functions used to shorten the documents befo...
Ahto Buldas, Sven Laur