Sciweavers

38 search results - page 6 / 8
» Identity Based Threshold Proxy Signcryption Scheme
Sort
View
EUROPKI
2004
Springer
14 years 4 months ago
Threshold Password-Based Authentication Using Bilinear Pairings
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private k...
Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Ki...
IMC
2009
ACM
14 years 5 months ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...
IJNSEC
2007
107views more  IJNSEC 2007»
13 years 10 months ago
A Traitor Tracing Scheme Based on the RSA System
Traitor tracing schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, the data-suppliers ca...
Bo Yang, Hua Ma, Shenglin Zhu
INFOCOM
2010
IEEE
13 years 9 months ago
Elastic Rate Limiting for Spatially Biased Wireless Mesh Networks
—IEEE 802.11-based mesh networks can yield a throughput distribution among nodes that is spatially biased, with traffic originating from nodes that directly communicate with the...
Vincenzo Mancuso, Omer Gurewitz, Ahmed Khattab, Ed...
WACV
2005
IEEE
14 years 4 months ago
Gait Verification Using Probabilistic Methods
In this paper we describe a novel method for gait based identity verification based on Bayesian classification. The verification task is reduced to a two class problem (Client or ...
Alex I. Bazin, Mark S. Nixon