Sciweavers

948 search results - page 93 / 190
» Attacking cryptographic schemes based on
Sort
View
CCS
2007
ACM
14 years 2 months ago
Chosen-ciphertext secure proxy re-encryption
In a proxy re-encryption (PRE) scheme, a proxy is given special information that allows it to translate a ciphertext under one key into a ciphertext of the same message under a di...
Ran Canetti, Susan Hohenberger
DIAL
2006
IEEE
103views Image Analysis» more  DIAL 2006»
14 years 2 months ago
Multi-Queue Merging Scheme And Its Application in Arabic Script Segmentation
It is an important topic for segmentation on how to merge the over-segmented subimages of characters into integral characters. The conventional character segmentation has been mos...
Pingping Xiu, Liangrui Peng, Xiaoqing Ding
CCS
2007
ACM
14 years 2 months ago
Security under key-dependent inputs
In this work we re-visit the question of building cryptographic primitives that remain secure even when queried on inputs that depend on the secret key. This was investigated by B...
Shai Halevi, Hugo Krawczyk
IJNSEC
2007
161views more  IJNSEC 2007»
13 years 8 months ago
Data Hiding: Current Status and Key Issues
Image steganography is a covert communication method that uses an image as the cover to hide the truth from potential attackers that some secret message hidden in the image is bei...
Nan-I Wu, Min-Shiang Hwang
IEAAIE
2007
Springer
14 years 2 months ago
Robust Multi-scale Full-Band Image Watermarking for Copyright Protection
With the exponential growth of digital materials in this age, the protection of Intellectual Property Right (IPR) becomes an important and urgent topic. In this paper, we propose a...
Jung-Chun Liu, Chu-Hsing Lin, Li-Ching Kuo, Jen-Ch...