Sciweavers

1094 search results - page 101 / 219
» List signature schemes
Sort
View
SEC
2008
13 years 11 months ago
Role Signatures for Access Control in Open Distributed Systems
Implementing access control efficiently and effectively in an open and distributed system is a challenging problem. One reason for this is that users requesting access to remote re...
Jason Crampton, Hoon Wei Lim
SSWMC
2004
13 years 11 months ago
Multimedia document authentication using on-line signatures as watermarks
Authentication of digital documents is an important concern as digital documents are replacing the traditional paper-based documents for official and legal purposes. This is espec...
Anoop M. Namboodiri, Anil K. Jain
CN
2008
100views more  CN 2008»
13 years 10 months ago
An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games
In recent years, massively multiplayer online games (MMOGs) have become very popular by providing more entertainment and sociability than single-player games. In order to prevent c...
Mo-Che Chan, Shun-Yun Hu, Jehn-Ruey Jiang
ICCAD
2007
IEEE
110views Hardware» more  ICCAD 2007»
14 years 7 months ago
A hybrid scheme for compacting test responses with unknown values
This paper presents a hybrid compaction scheme for test responses containing unknown values, which consists of a space compactor and an unknown-blocking Multiple Input Signature R...
Mango Chia-Tso Chao, Kwang-Ting Cheng, Seongmoon W...
IJNSEC
2006
107views more  IJNSEC 2006»
13 years 10 months ago
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero know...
Fagen Li, Xiangjun Xin, Yupu Hu