Sciweavers

2601 search results - page 48 / 521
» Secure Rewarding Schemes
Sort
View
IJCMAM
2010
160views more  IJCMAM 2010»
14 years 9 months ago
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an...
Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem...
CRYPTO
2004
Springer
119views Cryptology» more  CRYPTO 2004»
15 years 5 months ago
Security of Random Feistel Schemes with 5 or More Rounds
We study cryptographic attacks on random Feistel schemes. We denote by m the number of plaintext/ciphertext pairs, and by k the number of rounds. In their famous paper [3], M. Luby...
Jacques Patarin
CHI
2011
ACM
14 years 3 months ago
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes
While a large body of research on image-based authentication has focused on memorability, comparatively less attention has been paid to the new security challenges these schemes m...
Eiji Hayashi, Jason Hong, Nicolas Christin
ICCSA
2004
Springer
15 years 5 months ago
Security of Shen et al.'s Timestamp-Based Password Authentication Scheme
Abstract. Recently, Shen et al. proposed an improvement on YangShieh’s timestamp-based password authentication scheme using smart cards. Then they claimed that their scheme canno...
Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
INFOCOM
2010
IEEE
14 years 10 months ago
An Optimal Key Distribution Scheme for Secure Multicast Group Communication
Abstract— Many IP multicast-based applications, such as multimedia conferencing, multiplayer games, require controlling the group memberships of senders and receivers. One common...
Zhibin Zhou, Dijiang Huang