Sciweavers

369 search results - page 42 / 74
» Security Analysis of Several Group Signature Schemes
Sort
View
CISC
2007
Springer
108views Cryptology» more  CISC 2007»
15 years 3 months ago
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where e...
Christophe Tartary, Josef Pieprzyk, Huaxiong Wang
OTM
2007
Springer
15 years 6 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
PCI
2005
Springer
15 years 5 months ago
An MPEG-7 Based Description Scheme for Video Analysis Using Anthropocentric Video Content Descriptors
MPEG-7 has emerged as the standard for multimedia data content description. As it is in its early age, it tries to evolve towards a direction in which semantic content description ...
Nicholas Vretos, Vassilios Solachidis, Ioannis Pit...
SIGMETRICS
2009
ACM
122views Hardware» more  SIGMETRICS 2009»
15 years 6 months ago
Botnet spam campaigns can be long lasting: evidence, implications, and analysis
Accurately identifying spam campaigns launched by a large number of bots in a botnet allows for accurate spam campaign signature generation and hence is critical to defeating spam...
Abhinav Pathak, Feng Qian, Y. Charlie Hu, Zhuoqing...
WCNC
2008
IEEE
15 years 6 months ago
A Location Privacy Preserving Authentication Scheme in Vehicular Networks
Abstract—As an emerging application scenario of wireless technologies, vehicular communications have been initiated not only for enhancing the transportation safety and driving e...
Chenxi Zhang, Rongxing Lu, Pin-Han Ho, Anyi Chen