Sciweavers

1150 search results - page 129 / 230
» Beacon Based Authentication
Sort
View
ACISP
2006
Springer
14 years 20 days ago
Efficient and Provably Secure Multi-receiver Identity-Based Signcryption
In this paper, we propose an efficient multi-receiver identity based signcryption scheme which only needs one pairing computation to signcrypt a message for n receivers and can pro...
Shanshan Duan, Zhenfu Cao
PERCOM
2006
ACM
14 years 8 months ago
Proximity Based Access Control in Smart-Emergency Departments
In this paper, we propose a Proximity Based automated Access Control (PBAC) model for smart-ED environments which improves the existing ED work-flow by automating mundane administ...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...
IEEECIT
2005
IEEE
14 years 2 months ago
Identity Based Threshold Proxy Signcryption Scheme
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. ...
Meng Wang, Zhijing Liu
ACNS
2010
Springer
159views Cryptology» more  ACNS 2010»
14 years 1 months ago
A Message Recognition Protocol Based on Standard Assumptions
We look at the problem of designing Message Recognition Protocols (MRP) and note that all proposals available in the literature have relied on security proofs which hold in the ran...
Atefeh Mashatan, Serge Vaudenay
DIAL
2006
IEEE
129views Image Analysis» more  DIAL 2006»
14 years 18 days ago
Ink recognition based on statistical classification methods
Statistical classification methods can be applied on images of historical manuscript in order to characterize the various kinds of inks used. As these methods do not require destr...
Vasiliki Kokla, Alexandra Psarrou, Vassilis Konsta...