Sciweavers

110 search results - page 14 / 22
» Efficient hybrid encryption from ID-based encryption
Sort
View
EUROCRYPT
2000
Springer
13 years 10 months ago
Efficient Proofs that a Committed Number Lies in an Interval
Alice wants to prove that she is young enough to borrow money from her bank, without revealing her age. She therefore needs a tool for proving that a committed number lies in a spe...
Fabrice Boudot
CRYPTO
2008
Springer
165views Cryptology» more  CRYPTO 2008»
13 years 8 months ago
Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries
In this work we study the design of secure protocols for linear algebra problems. All current solutions to the problem are either inefficient in terms of communication complexity o...
Payman Mohassel, Enav Weinreb
IJNSEC
2010
120views more  IJNSEC 2010»
13 years 1 months ago
Secure Group Key Management Scheme for Multicast Networks
This paper proposes a scheme to provide security to dynamic multicast VoIP systems efficiently. Security is usually provided by encrypting the media packets sent from a user to ot...
R. Srinivasan, V. Vaidehi, R. Rajaraman, S. Kanaga...
GIS
2009
ACM
14 years 7 months ago
Efficient and Secure Distribution of Massive Geo-Spatial Data
Modern geographic databases can contain a large volume of data that need to be distributed to subscribed customers. The data can be modeled as a cube, where typical dimensions inc...
Hao Yuan, Mikhail J. Atallah
DATE
2005
IEEE
82views Hardware» more  DATE 2005»
14 years 10 days ago
Energy-Aware Routing for E-Textile Applications
As the scale of electronic devices shrinks, “electronic textiles” (e-textiles) will make possible a wide variety of novel applications which are currently unfeasible. Due to t...
Jung-Chun Kao, Radu Marculescu