Sciweavers

4529 search results - page 5 / 906
» Position Based Cryptography
Sort
View
ACNS
2004
Springer
92views Cryptology» more  ACNS 2004»
14 years 3 months ago
Private Keyword-Based Push and Pull with Applications to Anonymous Communication
Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn ...
IJHCR
2010
92views more  IJHCR 2010»
13 years 7 months ago
Client-Server Based LBS Architecture: A Novel Positioning Module for Improved Positioning Performance
Mohammad Al Nabhan, Suleiman Al Masri, Vanja Garaj...
ISW
2009
Springer
14 years 4 months ago
Towards Security Notions for White-Box Cryptography
Abstract. While code obfuscation attempts to hide certain characteristics of a program independently of an application, white-box cryptography (WBC) specifically focuses on softwa...
Amitabh Saxena, Brecht Wyseur, Bart Preneel
ICASSP
2009
IEEE
14 years 4 months ago
Color extended visual cryptography using error diffusion
This paper introduces a color visual cryptography encryption method that produces meaningful color shares via visual information pixel (VIP) synchronization and error diffusion ha...
In Koo Kang, Gonzalo R. Arce, Heung-Kyu Lee
ISCAS
2002
IEEE
112views Hardware» more  ISCAS 2002»
14 years 2 months ago
Tradeoff analysis of FPGA based elliptic curve cryptography
FPGAs are an attractive platform for elliptic curve cryptography hardware. Since field multiplication is the most critical operation in elliptic curve cryptography, we have studi...
Marcus Bednara, M. Daldrup, Jürgen Teich, Joa...