Sciweavers

4805 search results - page 76 / 961
» On the Analysis of Indexing Schemes
Sort
View
HOST
2009
IEEE
14 years 2 months ago
Analysis and Design of Active IC Metering Schemes
—Outsourcing the fabrication of semiconductor devices to merchant foundries raises some issues concerning the IP protection of the design. Active hardware metering schemes try to...
Roel Maes, Dries Schellekens, Pim Tuyls, Ingrid Ve...
ICIG
2009
IEEE
14 years 2 months ago
Analysis and Evaluation of the ColorLogin Graphical Password Scheme
It is believed that graphical passwords are more memorable than traditional textual passwords, but usually seen as complex and time-consuming for users. Furthermore, most of the e...
Haichang Gao, Xiyang Liu, Ruyi Dai, Sidong Wang, X...
IPPS
1998
IEEE
14 years 9 days ago
Performance Analysis of a Fault-Tolerant Scheme for Location Management of Mobile Hosts
We consider the problem of location management of mobile users. The objective is to keep track of the mobile users in order to deliver calls. The IS-41 is a simple strategy for loc...
Saad Biaz, Nitin H. Vaidya
EUROCRYPT
2000
Springer
13 years 11 months ago
Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme
We exhibit an attack against a signature scheme recently proposed by Gennaro, Halevi and Rabin [9]. The scheme's security is based on two assumptions namely the strong RSA ass...
Jean-Sébastien Coron, David Naccache
CANS
2008
Springer
111views Cryptology» more  CANS 2008»
13 years 10 months ago
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
In a (r, n)-threshold secret sharing scheme, no group of (r - 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time...
Tiancheng Lou, Christophe Tartary