Sciweavers

2601 search results - page 83 / 521
» Secure Rewarding Schemes
Sort
View
TPDS
2008
106views more  TPDS 2008»
15 years 2 months ago
Security-Aware Resource Allocation for Real-Time Parallel Jobs on Homogeneous and Heterogeneous Clusters
Security is increasingly becoming an important issue in the design of real-time parallel applications, which are widely used in the industry and academic organizations. However, ex...
Tao Xie 0004, Xiao Qin
AICCSA
2005
IEEE
91views Hardware» more  AICCSA 2005»
15 years 8 months ago
Secure transmission of sensitive data using multiple channels
A new scheme for transmitting sensitive data is proposed, the proposed scheme depends on partitioning the output of a block encryption module using the Chinese Remainder Theorem a...
Abdelhamid S. Abdelhamid, Ahmed A. Belal
JCIT
2008
130views more  JCIT 2008»
15 years 2 months ago
Group-oriented Encryption Secure against Collude Attack
A group oriented encryption scheme is presented in this paper. In this scheme, a sender is allowed to encrypt a message using the group public key and send the ciphertext to the gr...
Chunbo Ma, Jun Ao
ISPA
2005
Springer
15 years 8 months ago
ID-Based Proxy Signature Using Bilinear Pairings
Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate securit...
Jing Xu, Zhenfeng Zhang, Dengguo Feng
106
Voted
ACISP
2004
Springer
15 years 8 months ago
Weak Property of Malleability in NTRUSign
A new type of signature scheme, called NTRUSign, based on solving the approximately closest vector problem in a NTRU lattice was proposed at CT-RSA’03. However no security proof ...
SungJun Min, Go Yamamoto, Kwangjo Kim