Sciweavers

356 search results - page 35 / 72
» Cryptography in the Bounded-Quantum-Storage Model
Sort
View
DEXAW
2002
IEEE
231views Database» more  DEXAW 2002»
14 years 20 days ago
A Cultural Heritage Forum Celebrating Technological Innovation at Station X
We aim to encourage and support public participation in heritage through the development of Cultural Heritage Forums, a kind of cultural web portal that enables active participati...
Trevor D. Collins, Paul Mulholland
EVOW
2006
Springer
13 years 11 months ago
BeeHiveGuard: A Step Towards Secure Nature Inspired Routing Algorithms
Abstract. Nature inspired routing protocols for fixed and mobile networks are becoming an active area of research. However, analyzing their security threats and countering them hav...
Horst Wedde, Constantin Timm, Muddassar Farooq
ASAP
2008
IEEE
105views Hardware» more  ASAP 2008»
13 years 9 months ago
Fast custom instruction identification by convex subgraph enumeration
Automatic generation of custom instruction processors from high-level application descriptions enables fast design space exploration, while offering very favorable performance and...
Kubilay Atasu, Oskar Mencer, Wayne Luk, Can C. &Ou...
INFORMATICALT
2006
105views more  INFORMATICALT 2006»
13 years 7 months ago
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...
Yu Long, Kefei Chen, Shengli Liu
IJISEC
2010
87views more  IJISEC 2010»
13 years 6 months ago
How to construct identity-based signatures without the key escrow problem
The inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by a...
Tsz Hon Yuen, Willy Susilo, Yi Mu