Sciweavers

649 search results - page 79 / 130
» Enabling Public Discourse
Sort
View
CISC
2006
Springer
103views Cryptology» more  CISC 2006»
13 years 11 months ago
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
In this paper, we investigate the problem of increasing the threshold parameter of the Shamir (t, n)-threshold scheme without interacting with the dealer. Our construction will re...
Christophe Tartary, Huaxiong Wang
CTRSA
2006
Springer
157views Cryptology» more  CTRSA 2006»
13 years 11 months ago
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack
Abstract. In this paper we present a general framework for constructing efficient multicast cryptosystems with provable security and show that a line of previous work on multicast ...
Yitao Duan, John F. Canny
ERCIMDL
2000
Springer
133views Education» more  ERCIMDL 2000»
13 years 11 months ago
EULER - A DC-Based Integrated Access to Library Catalogues and Other Mathematics Information in the Web
Literature databases, scientific journals and com munication between researchers on the electronic level are rapidly developing tools in mathematics having high impact on the daily...
Bernd Wegner
PKC
2000
Springer
120views Cryptology» more  PKC 2000»
13 years 11 months ago
Optimally Efficient Accountable Time-Stamping
Abstract. Efficient secure time-stamping schemes employ a 2-level approach in which the time-stamping service operates in rounds. We say that a time-stamping service is accountable...
Ahto Buldas, Helger Lipmaa, Berry Schoenmakers
CAE
2007
13 years 10 months ago
memory [en]code - Building a Collective Memory within a Tabletop Installation
In this paper, we introduce memory [en]code, a project that evolved through an art+science collaboration. memory [en]code is an interactive tabletop installation that visualizes d...
Holly Schmidt, Uta Hinrichs, Alan Dunning, M. Shee...