Sciweavers

24529 search results - page 79 / 4906
» Computing on Authenticated Data
Sort
View
CCS
2008
ACM
14 years 12 hour ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
FCS
2006
13 years 11 months ago
Cryptographic and Computational Challenges in Grid Computing
A computational grid is a large-scale distributed computing environment capable of providing dependable, consistent, pervasive, and inexpensive access to high-end computational re...
Song Y. Yan, Glyn James, Gongyi Wu
ARTCOM
2009
IEEE
14 years 3 months ago
Text Fusion Watermarking in Medical Image with Semi-reversible for Secure Transfer and Authentication
Nowadays, the transmission of digitized medical information has become very convenient due to the generality of Internet. Internet has created the biggest benefit to achieve the tr...
P. Viswanathan, P. Venkata Krishna

Publication
295views
13 years 6 months ago
 Self-Authentication Of Natural Color Images In Pascal Transform Domain
This paper proposes a self-authentication scheme for color images, using a fragile data hiding method based on the Discrete Pascal Transform (DPT). The main contribution of this wo...
E. E. Varsaki, V. Fotopoulos and A. N. Skodras