Sciweavers

391 search results - page 67 / 79
» On-Line Secret Sharing
Sort
View
IWDW
2005
Springer
14 years 1 months ago
ViWiD : Visible Watermarking Based Defense Against Phishing
In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks - a form of web based identity theft. ViWiD is an integrity check m...
Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, ...
ECCV
2004
Springer
14 years 1 months ago
Robust Encoding of Local Ordinal Measures: A General Framework of Iris Recognition
Abstract. The randomness of iris pattern makes it one of the most reliable biometric traits. On the other hand, the complex iris image structure and various sources of intra-class ...
Zhenan Sun, Tieniu Tan, Yunhong Wang
SCN
2004
Springer
102views Communications» more  SCN 2004»
14 years 1 months ago
On the Size of Monotone Span Programs
Abstract. Span programs provide a linear algebraic model of computation. Monotone span programs (MSP) correspond to linear secret sharing schemes. This paper studies the properties...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
14 years 28 days ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
ACNS
2003
Springer
193views Cryptology» more  ACNS 2003»
14 years 26 days ago
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem
Distributed key generation is one of the most challenging tasks for threshold cryptosystems. Designing such a protocol and proving its security against a malicious, adaptive adver...
Rui Zhang 0002, Hideki Imai