Sciweavers

231 search results - page 27 / 47
» Generalized Identity Based and Broadcast Encryption Schemes
Sort
View
147
Voted
IJNSEC
2007
131views more  IJNSEC 2007»
15 years 3 months ago
An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies
In a hierarchical structure, a user in a security class has access to information items of another class if and only if the former class is a predecessor of latter. Based upon cry...
Debasis Giri, Parmeshwary Dayal Srivastava
138
Voted
CVPR
2006
IEEE
16 years 5 months ago
Using Bilinear Models for View-invariant Action and Identity Recognition
Human identification from gait is a challenging task in realistic surveillance scenarios in which people walking along arbitrary directions are shot by a single camera. In this pa...
Fabio Cuzzolin
176
Voted
CODASPY
2012
13 years 11 months ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
199
Voted
CANS
2011
Springer
292views Cryptology» more  CANS 2011»
14 years 3 months ago
Breaking Fully-Homomorphic-Encryption Challenges
At EUROCRYPT ’10, van Dijk, Gentry, Halevi and Vaikuntanathan presented simple fully-homomorphic encryption (FHE) schemes based on the hardness of approximate integer common div...
Phong Q. Nguyen
154
Voted
ACISP
2008
Springer
15 years 10 months ago
Secure Biometric Authentication with Improved Accuracy
Abstract. We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summar...
Manuel Barbosa, Thierry Brouard, Stéphane C...