Sciweavers

88 search results - page 8 / 18
» Security Analysis of Two Signcryption Schemes
Sort
View
CCS
2003
ACM
15 years 10 months ago
Establishing pairwise keys in distributed sensor networks
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. Ho...
Donggang Liu, Peng Ning
MEDIAFORENSICS
2010
15 years 3 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
CCS
2007
ACM
15 years 11 months ago
Do background images improve "draw a secret" graphical passwords?
Draw a secret (DAS) is a representative graphical password scheme. Rigorous theoretical analysis suggests that DAS supports an overall password space larger than that of the ubiqu...
Paul Dunphy, Jeff Yan
ICALP
2005
Springer
15 years 10 months ago
Single-Database Private Information Retrieval with Constant Communication Rate
We present a single-database private information retrieval (PIR) scheme with communication complexity O(k+d), where k ≥ log n is a security parameter that depends on the database...
Craig Gentry, Zulfikar Ramzan
ESAS
2007
Springer
15 years 11 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...