Sciweavers

679 search results - page 58 / 136
» Using decision problems in public key cryptography
Sort
View
ICDCSW
2005
IEEE
15 years 7 months ago
Defending against Sybil Attacks in Sensor Networks
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certifi...
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng N...
CSREASAM
2006
15 years 2 months ago
Cryptcoding - Encryption and Error-Correction Coding in a Single Step
In this paper we re-open a 25 years old question of joint encryption and error-correction coding, named here as Cryptcoding. Cryptcoding is a procedure in which encryption/decrypti...
Danilo Gligoroski, Svein J. Knapskog, Suzana Andov...
IJNSEC
2008
154views more  IJNSEC 2008»
15 years 1 months ago
ID-based Weak Blind Signature From Bilinear Pairings
In a blind signature scheme, the user can get a signature sig(m) on message m generated from the signer's blind signature sig(m ) on blinded message m , but the signer can�...
Ze-mao Zhao
ESWS
2010
Springer
15 years 6 months ago
Put in Your Postcode, Out Comes the Data: A Case Study
A single datum or a set of a categorical data has little value on its own. Combinations of disparate sets of data increase the value of those data sets and helps to discover intere...
Tope Omitola, Christos L. Koumenides, Igor O. Popo...
ECWEB
2010
Springer
195views ECommerce» more  ECWEB 2010»
15 years 2 months ago
Comparing Techniques for Preference Relaxation: A Decision Theory Perspective
This research proposes a decision aid based on a novel type of preference relaxation, which enables consumers to easily make quality choices in online multiattribute choice scenari...
Maciej Dabrowski, Thomas Acton