Sciweavers

2059 search results - page 4 / 412
» A Directed Threshold - Signature Scheme
Sort
View
WCNC
2010
IEEE
14 years 1 months ago
Adaptive Multiple Relay Selection Scheme for Cooperative Wireless Networks
Abstract—In this paper, we propose an output-threshold multiple relay selection scheme for dual-hop multi-branch cooperative wireless networks. The proposed scheme selects the ï¬...
Gayan Amarasuriya, Masoud Ardakani, Chintha Tellam...
ICPR
2008
IEEE
14 years 11 months ago
A machine learning based scheme for double JPEG compression detection
Double JPEG compression detection is of significance in digital forensics. We propose an effective machine learning based scheme to distinguish between double and single JPEG comp...
Chunhua Chen, Wei Su, Yun Q. Shi
CANS
2008
Springer
111views Cryptology» more  CANS 2008»
13 years 11 months ago
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
In a (r, n)-threshold secret sharing scheme, no group of (r - 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time...
Tiancheng Lou, Christophe Tartary
INFORMATICALT
2006
105views more  INFORMATICALT 2006»
13 years 9 months ago
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...
Yu Long, Kefei Chen, Shengli Liu
IJNSEC
2006
94views more  IJNSEC 2006»
13 years 9 months ago
Construction of Dynamic Threshold Decryption Scheme from Pairing
The first dynamic threshold decryption scheme from pairing is presented. It is secure in groups equipped with a bilinear map, and caters to some important requirements in real app...
Yu Long, Kefei Chen