Sciweavers

IAJIT
2016
60views Biometrics» more  IAJIT 2016»
9 years 12 months ago
Efficient transmission of PKI certificates using elliptic curve cryptography and its variants
: The demand for wireless networks is increasing rapidly and it becomes essential to design existing Public-Key Infrastructure (PKI) useful for wireless devices. A PKI is a set of ...
Shivkumar Selvakumaraswamy, Umamaheswari Govindasw...
IAJIT
2016
60views Biometrics» more  IAJIT 2016»
9 years 12 months ago
Human visual perception-based image quality analyzer for assessment of contrast enhancement methods
: Absolute Mean Brightness Error (AMBE) and entropy are two popular Image Quality Analyzer (IQA) metrics used for assessment of Histogram Equalization (HE)-based contrast enhanceme...
Soong-Der Chen
IAJIT
2016
45views Biometrics» more  IAJIT 2016»
9 years 12 months ago
Designing a fuzzy-logic based trust and reputation model for secure resource allocation in cloud computing
: To plan and improve a fuzzy logic and neural network based trust and reputation model for safe resource allocation in cloud computing is the most important motto of this research...
Kamalanathan Chandran, Valarmathy Shanmugasudaram,...
IACR
2016
46views Biometrics» more  IACR 2016»
9 years 12 months ago
OPFE: Outsourcing Computation for Private Function Evaluation
Outsourcing secure multiparty computation (SMC) protocols has allowed resource-constrained devices to take advantage of these developing cryptographic primitives with great effici...
Henry Carter, Patrick Traynor
IACR
2016
51views Biometrics» more  IACR 2016»
9 years 12 months ago
Nonce-based Kerberos is a Secure Delegated AKE Protocol
Abstract. Kerberos is one of the most important cryptographic protocols, first because it is the basisc authentication protocol in Microsoft’s Active Directory and shipped with ...
Jörg Schwenk
IACR
2016
41views Biometrics» more  IACR 2016»
9 years 12 months ago
A Subgradient Algorithm For Computational Distances and Applications to Cryptography
The task of finding a constructive approximation in the computational distance, while simultaneously preserving additional constrains (referred to as "simulators"), app...
Maciej Skórski
IACR
2016
45views Biometrics» more  IACR 2016»
9 years 12 months ago
A note on Tensor Simple Matrix Encryption Scheme
The simple matrix encryption scheme (Tao-Diene-Tang-Ding, PQCrypto 2013) has a problem of decryption failures. Quite recently, Petzoldt-Ding-Wang (http://eprint.iacr. org/2016/010...
Yasufumi Hashimoto
IACR
2016
52views Biometrics» more  IACR 2016»
9 years 12 months ago
Robust Password-Protected Secret Sharing
Abstract. Password-protected secret sharing (PPSS) schemes allow a user to publicly share this highentropy secret across different servers and to later recover it by interacting w...
Michel Abdalla, Mario Cornejo, Anca Nitulescu, Dav...
IACR
2016
48views Biometrics» more  IACR 2016»
9 years 12 months ago
Proofs of Space-Time and Rational Proofs of Storage
Abstract. We introduce a new cryptographic primitive: Proofs of SpaceTime (PoSTs) and construct a practical protocol for implementing these proofs. A PoST allows a prover to convin...
Tal Moran, Ilan Orlov
IACR
2016
59views Biometrics» more  IACR 2016»
9 years 12 months ago
Access Control Encryption: Enforcing Information Flow with Cryptography
We initiate the study of Access Control Encryption (ACE), a novel cryptographic primitive that allows fine-grained access control, by giving different rights to different users ...
Ivan Damgård, Helene Haagh, Claudio Orlandi