Sciweavers

2601 search results - page 85 / 521
» Secure Rewarding Schemes
Sort
View
PROVSEC
2007
Springer
15 years 9 months ago
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a threshold t, and then encrypts a message by using the public keys of all the recei...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...
CTRSA
2003
Springer
105views Cryptology» more  CTRSA 2003»
15 years 8 months ago
Forward-Security in Private-Key Cryptography
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by...
Mihir Bellare, Bennet S. Yee
119
Voted
ASIACRYPT
2001
Springer
15 years 7 months ago
Provably Secure Fair Blind Signatures with Tight Revocation
A fair blind signature scheme allows the trustee to revoke blindness so that it provides authenticity and anonymity to honest users while preventing malicious users from abusing th...
Masayuki Abe, Miyako Ohkubo
140
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
Stimulating Cooperation in Multi-hop Wireless Networks Using Cheating Detection System
— In multi-hop wireless networks, the mobile nodes usually act as routers to relay packets generated from other nodes. However, selfish nodes do not cooperate but make use of the...
Mohamed Elsalih Mahmoud, Xuemin Shen
IJBC
2008
50views more  IJBC 2008»
15 years 2 months ago
Secure Data Transmission Based on Multi-Input Multi-Output Delayed Chaotic System
This paper deals with the problem of secure data transmission based on multi-input multi-output delayed chaotic systems. A new multi-input secure data transmission scheme is propo...
Gang Zheng, Driss Boutat, Thierry Floquet, Jean-Pi...