Sciweavers

787 search results - page 89 / 158
» Subversion-Resilient Signature Schemes
Sort
View
CORR
2000
Springer
93views Education» more  CORR 2000»
14 years 9 months ago
The Random Oracle Methodology, Revisited
We take a critical look at the relationship between the security of cryptographic schemes in the Random Oracle Model, and the security of the schemes that result from implementing...
Ran Canetti, Oded Goldreich, Shai Halevi
PCM
2005
Springer
88views Multimedia» more  PCM 2005»
15 years 3 months ago
A Robust Method for Data Hiding in Color Images
In this paper, we propose a methodology for embedding watermark image data into color images. At the transmitter, the signature image is encoded by a multiple description encoder. ...
Mohsen Ashourian, Payman Moallem, Yo-Sung Ho
ISCIS
2003
Springer
15 years 3 months ago
Multiple Description Coding for Image Data Hiding in the Spatial Domain
In this paper, we develop a robust image data hiding scheme based on multiple description coding of the signature image. At the transmitter, the signature image is encoded by balan...
Mohsen Ashourian, Yo-Sung Ho
ICC
2007
IEEE
133views Communications» more  ICC 2007»
15 years 4 months ago
Non-Orthogonal Transmission and Noncoherent Fusion of Censored Decisions
— In this paper, we propose a novel signaling scheme and corresponding noncoherent fusion rules for wireless sensor networks. In the proposed scheme, sensors transmit censored de...
Simon Yiu, Robert Schober
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
13 years 5 months ago
On the Instantiability of Hash-and-Sign RSA Signatures
The hash-and-sign RSA signature is one of the most elegant and well known signatures schemes, extensively used in a wide variety of cryptographic applications. Unfortunately, the o...
Yevgeniy Dodis, Iftach Haitner, Aris Tentes