Sciweavers

1094 search results - page 90 / 219
» List signature schemes
Sort
View
ICALP
2005
Springer
14 years 3 months ago
Completely Non-malleable Schemes
Abstract An encryption scheme is non-malleable if the adversary cannot transform a ciphertext into one of a related message under the given public key. Although providing a very st...
Marc Fischlin
ESORICS
2008
Springer
13 years 12 months ago
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough
The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP...
Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X...
NAR
2010
123views more  NAR 2010»
13 years 4 months ago
Discovering causal signaling pathways through gene-expression patterns
High-throughput gene-expression studies result in lists of differentially expressed genes. Most current meta-analyses of these gene lists include searching for significant members...
Jignesh R. Parikh, Bertram Klinger, Yu Xia, Jarrod...
AMC
2005
188views more  AMC 2005»
13 years 10 months ago
An efficient signcryption scheme with forward secrecy based on elliptic curve
An efficient signcryption scheme based on elliptic curve is proposed in this paper. The signcryption scheme combines digital signature and encryption functions. The proposed schem...
Ren-Junn Hwang, Chih-Hua Lai, Feng-Fu Su
ICICS
2003
Springer
14 years 3 months ago
Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains
In this paper, we propose a new method for hiding a signature image in the host image. We encode the signature image by a balanced two-description subband coder and embed the descr...
Mohsen Ashourian, Yo-Sung Ho