Sciweavers

961 search results - page 1 / 193
» Visual Cryptography on Graphs
Sort
View
124
Voted
COCOON
2008
Springer
15 years 2 months ago
Visual Cryptography on Graphs
In this paper, we consider a new visual cryptography scheme that allows for sharing of multiple secret images on graphs: we are given an arbitrary graph (V, E) where every node an...
Steve Lu, Daniel Manchala, Rafail Ostrovsky
103
Voted
VIROLOGY
2010
136views more  VIROLOGY 2010»
14 years 7 months ago
Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis
Jean-Baptiste Bedrune, Eric Filiol, Fréd&ea...
76
Voted
TCC
2005
Springer
101views Cryptology» more  TCC 2005»
15 years 6 months ago
Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs
Moni Naor, Asaf Nussboim, Eran Tromer
DCC
2006
IEEE
16 years 20 days ago
Cheating in Visual Cryptography
Gwoboa Horng, Tzungher Chen, Du-shiau Tsai
104
Voted
IJCNN
2000
IEEE
15 years 5 months ago
A Neural Network Approach for Visual Cryptography
In this paper, we propose a neural-network approach for visual authorization. It is an application on visual cryptography. The scheme contains a key-share and a set of user-shares....
Tai-Wen Yue, Suchen Chiang