Sciweavers

42 search results - page 4 / 9
» A Verifiable and Detectable Secret Sharing Scheme by Using a...
Sort
View
INDOCRYPT
2004
Springer
14 years 24 days ago
New ID-Based Threshold Signature Scheme from Bilinear Pairings
ID-based public key systems allow the user to use his/her identity as the public key, which can simplify key management procedure compared with CA-based public key systems. However...
Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, ...
MSE
2002
IEEE
198views Hardware» more  MSE 2002»
14 years 11 days ago
BSS: A New Approach for Watermark Attack
Digital watermarking is the enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multi...
Jiang Du, Choong-Hoon Lee, Heung-Kyu Lee, Young-Ho...
INFOCOM
2007
IEEE
14 years 1 months ago
Many-to-Many Communication: A New Approach for Collaboration in MANETs
—We introduce a collaboration-driven approach to the sharing of the available bandwidth in wireless ad hoc networks, which we call many-to-many cooperation, that allows concurren...
Renato M. de Moraes, Hamid R. Sadjadpour, J. J. Ga...
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 8 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
EUROCRYPT
2009
Springer
14 years 8 months ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...