Sciweavers

787 search results - page 94 / 158
» Subversion-Resilient Signature Schemes
Sort
View
SSWMC
2004
14 years 11 months ago
Multimedia document authentication using on-line signatures as watermarks
Authentication of digital documents is an important concern as digital documents are replacing the traditional paper-based documents for official and legal purposes. This is espec...
Anoop M. Namboodiri, Anil K. Jain
CN
2008
100views more  CN 2008»
14 years 10 months ago
An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games
In recent years, massively multiplayer online games (MMOGs) have become very popular by providing more entertainment and sociability than single-player games. In order to prevent c...
Mo-Che Chan, Shun-Yun Hu, Jehn-Ruey Jiang
ICCAD
2007
IEEE
110views Hardware» more  ICCAD 2007»
15 years 6 months ago
A hybrid scheme for compacting test responses with unknown values
This paper presents a hybrid compaction scheme for test responses containing unknown values, which consists of a space compactor and an unknown-blocking Multiple Input Signature R...
Mango Chia-Tso Chao, Kwang-Ting Cheng, Seongmoon W...
IJNSEC
2006
107views more  IJNSEC 2006»
14 years 9 months ago
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero know...
Fagen Li, Xiangjun Xin, Yupu Hu
ASIACRYPT
2009
Springer
15 years 4 months ago
Group Encryption: Non-interactive Realization in the Standard Model
Group encryption (GE) schemes, introduced at Asiacrypt’07, are an encryption analogue of group signatures with a number of interesting applications. They allow a sender to encryp...
Julien Cathalo, Benoît Libert, Moti Yung