Sciweavers

65 search results - page 11 / 13
» Space-Efficient Identity Based Encryption Without Pairings
Sort
View
SCN
2010
Springer
232views Communications» more  SCN 2010»
14 years 8 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena
CCS
2005
ACM
15 years 3 months ago
Direct chosen ciphertext security from identity-based techniques
We describe a new encryption technique that is secure in the standard model against adaptive chosen ciphertext (CCA2) attacks. We base our method on two very efficient Identity-Ba...
Xavier Boyen, Qixiang Mei, Brent Waters
INFOCOM
2005
IEEE
15 years 4 months ago
Anonymous communications in mobile ad hoc networks
— Due to the broadcast nature of radio transmissions, communications in mobile ad hoc networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we prop...
Yanchao Zhang, Wei Liu, Wenjing Lou
BMCBI
2008
140views more  BMCBI 2008»
14 years 10 months ago
SCPRED: Accurate prediction of protein structural class for sequences of twilight-zone similarity with predicting sequences
Background: Protein structure prediction methods provide accurate results when a homologous protein is predicted, while poorer predictions are obtained in the absence of homologou...
Lukasz A. Kurgan, Krzysztof J. Cios, Ke Chen 0003
AINA
2007
IEEE
15 years 4 months ago
Mining Visual Knowledge for Multi-Lingual Image Retrieval
Users commonly rely just on scarce textual annotation when their searches for images are semantic or conceptual based. Rich visual information is often thrown away in basic annota...
Masashi Inoue