Sciweavers

67 search results - page 13 / 14
» A Threshold GQ Signature Scheme
Sort
View
TWC
2008
154views more  TWC 2008»
13 years 9 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
JSAC
2006
165views more  JSAC 2006»
13 years 9 months ago
ALPi: A DDoS Defense System for High-Speed Networks
Distributed denial-of-service (DDoS) attacks pose a significant threat to the Internet. Most solutions proposed to-date face scalability problems as the size and speed of the netwo...
P. E. Ayres, H. Sun, H. Jonathan Chao, Wing Cheong...
SP
2007
IEEE
120views Security Privacy» more  SP 2007»
14 years 3 months ago
Endorsed E-Cash
An electronic cash (e-cash) scheme lets a user withdraw money from a bank and then spend it anonymously. E-cash can be used only if it can be securely and fairly exchanged for ele...
Jan Camenisch, Anna Lysyanskaya, Mira Meyerovich
EUROCRYPT
2000
Springer
14 years 1 months ago
Computing Inverses over a Shared Secret Modulus
We discuss the following problem: Given an integer shared secretly among n players and a prime number e, how can the players efficiently compute a sharing of e-1 mod . The most in...
Dario Catalano, Rosario Gennaro, Shai Halevi
CIBCB
2009
IEEE
13 years 7 months ago
Shape modeling and clustering of white matter fiber tracts using fourier descriptors
Reliable shape modeling and clustering of white matter fiber tracts is essential for clinical and anatomical studies that use diffusion tensor imaging (DTI) tractography techniques...
Xuwei Liang, Qi Zhuang, Ning Cao, Jun Zhang