Sciweavers

849 search results - page 17 / 170
» Completely Non-malleable Schemes
Sort
View
IJNSEC
2008
155views more  IJNSEC 2008»
13 years 7 months ago
Cryptanalysis of Liao-Lee-Hwang's Dynamic ID Scheme
Recently, Das, Saxena and Gulati proposed a dynamic Id based remote user authentication scheme that allows the users to choose and change their passwords freely and does not maint...
Mohammed Misbahuddin, C. Shoba Bindu
DEXA
2007
Springer
112views Database» more  DEXA 2007»
14 years 1 months ago
A Dynamic Labeling Scheme Using Vectors
Abstract. The labeling problem of dynamic XML documents has received increasing research attention. When XML documents are subject to insertions and deletions of nodes, it is impor...
Liang Xu, Zhifeng Bao, Tok Wang Ling
MOBICOM
1997
ACM
13 years 12 months ago
A Protection Scheme for Mobile Agents on Java
: This paper describes a protection scheme for mobile agents implemented on a Java environment. In this scheme, access to objects is controlled by means of software capabilities th...
Daniel Hagimont, Leila Ismail
EUROCRYPT
2011
Springer
12 years 11 months ago
Implementing Gentry's Fully-Homomorphic Encryption Scheme
We describe a working implementation of a variant of Gentry’s fully homomorphic encryption scheme (STOC 2009), similar to the variant used in an earlier implementation effort b...
Craig Gentry, Shai Halevi
ICMCS
2006
IEEE
137views Multimedia» more  ICMCS 2006»
14 years 1 months ago
An Efficient Reference Frame Storage Scheme for H.264 HDTV Decoder
This paper proposes an efficient reference frame storage scheme for HDTV VLSI decoder to reduce external memory bandwidth requirement. The proposed scheme consists of the pixel du...
Peng Zhang, Wen Gao, Di Wu, Don Xie