Sciweavers

2601 search results - page 492 / 521
» Secure Rewarding Schemes
Sort
View
APCSAC
2001
IEEE
15 years 3 months ago
Password-Capabilities: Their Evolution from the Password-Capability System into Walnut and Beyond
Since we first devised and defined password-capabilities as a new technique for building capability-based operating systems, a number of research systems around the world have use...
Ronald Pose
COCOON
2008
Springer
15 years 1 months ago
Visual Cryptography on Graphs
In this paper, we consider a new visual cryptography scheme that allows for sharing of multiple secret images on graphs: we are given an arbitrary graph (V, E) where every node an...
Steve Lu, Daniel Manchala, Rafail Ostrovsky
EUROCRYPT
2008
Springer
15 years 1 months ago
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
Consider an abstract storage device (G) that can hold a single element x from a fixed, publicly known finite group G. Storage is private in the sense that an adversary does not hav...
Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles ...
SEC
2008
15 years 1 months ago
Software Licence Protection and Management for Organisations
Abstract Most organisations have recently converted their physical assets into digital forms. This underlines the needs to have different types of software products to manage such ...
Muntaha Alawneh, Imad M. Abbadi
CHES
2010
Springer
189views Cryptology» more  CHES 2010»
15 years 28 days ago
Quark: A Lightweight Hash
The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by application designers, notably for implementing RFI...
Jean-Philippe Aumasson, Luca Henzen, Willi Meier, ...