Sciweavers

158 search results - page 15 / 32
» Analysis of improved signcryption scheme with key privacy
Sort
View
CORR
2007
Springer
108views Education» more  CORR 2007»
13 years 8 months ago
Error Probability Analysis of Peaky Signaling over Fading Channels
Abstract— In this paper, the performance of signaling strategies with high peak-to-average power ratio is analyzed in both coherent and noncoherent fading channels Two recently p...
Mustafa Cenk Gursoy
ICMCS
2006
IEEE
128views Multimedia» more  ICMCS 2006»
14 years 2 months ago
On the Security of Multimedia Encryption Schemes Based on Multiple Huffman Table (MHT)
This paper addresses the security issues of the multimedia encryption schemes based on multiple Huffman table (MHT). A detailed analysis of known-plaintext attack is presented to ...
Jiantao Zhou, Zhiqin Liang, Yan Chen, Oscar C. Au
INFFUS
2007
117views more  INFFUS 2007»
13 years 8 months ago
Pixel-based and region-based image fusion schemes using ICA bases
The task of enhancing the perception of a scene by combining information captured by different sensors is usually known as image fusion. The pyramid decomposition and the Dual-Tr...
Nikolaos Mitianoudis, Tania Stathaki
IACR
2011
196views more  IACR 2011»
12 years 8 months ago
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Gilad Asharov, Abhishek Jain, Daniel Wichs
EUROPKI
2006
Springer
14 years 8 days ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng