Sciweavers

1834 search results - page 258 / 367
» Public Key Cryptography
Sort
View
CHI
2005
ACM
14 years 8 months ago
Evaluating paper prototypes on the street
The evaluation of paper prototypes is normally conducted in controlled settings such as a usability lab. This paper, in contrast, reports on a study where evaluations of a paper p...
David G. Hendry, Sara Mackenzie, Ann Kurth, Freya ...
STOC
2009
ACM
238views Algorithms» more  STOC 2009»
14 years 2 months ago
Fully homomorphic encryption using ideal lattices
We propose a fully homomorphic encryption scheme – i.e., a scheme that allows one to evaluate circuits over encrypted data without being able to decrypt. Our solution comes in t...
Craig Gentry
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
Abstract. Fault Analysis is a powerful cryptanalytic technique that enables to break cryptographic implementations embedded in portable devices more efficiently than any other tech...
Matthieu Rivain
APNOMS
2009
Springer
14 years 2 months ago
A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network
Wireless mesh network can increase service coverage by low-cost multiple-paths between a source and a destination. But because of the wireless nature, wireless mesh network is vuln...
Kwang Hyun Lee, Choong Seon Hong
ICPR
2008
IEEE
14 years 2 months ago
Using SIFT features in palmprint authentication
As a new branch of biometrics, palmprint authentication has attracted increasing amount of attention because palmprints are abundant of line features so that low resolution images...
Jiansheng Chen, Yiu Sang Moon