Sciweavers

149 search results - page 17 / 30
» A Scheme for Obtaining a Message from the Digital Multisigna...
Sort
View
IACR
2011
89views more  IACR 2011»
12 years 7 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown
ITCC
2002
IEEE
14 years 16 days ago
Audio Watermarking Quality Evaluation: Robustness to DA/AD Processes
Audio watermarking has become an important technology for recording and advertisement industry. Today’s embedding and detection strategies often rely on digital or at least high...
Martin Steinebach, Andreas Lang, Jana Dittmann, Ch...
CRYPTO
2000
Springer
133views Cryptology» more  CRYPTO 2000»
13 years 12 months ago
Sequential Traitor Tracing
Traceability schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to digital content. Fiat and Ta...
Reihaneh Safavi-Naini, Yejing Wang
SENSYS
2004
ACM
14 years 1 months ago
Medians and beyond: new aggregation techniques for sensor networks
Wireless sensor networks offer the potential to span and monitor large geographical areas inexpensively. Sensors, however, have significant power constraint (battery life), makin...
Nisheeth Shrivastava, Chiranjeeb Buragohain, Divya...
SOSP
2003
ACM
14 years 4 months ago
Performance debugging for distributed systems of black boxes
Many interesting large-scale systems are distributed systems of multiple communicating components. Such systems can be very hard to debug, especially when they exhibit poor perfor...
Marcos Kawazoe Aguilera, Jeffrey C. Mogul, Janet L...