Sciweavers

1834 search results - page 278 / 367
» Public Key Cryptography
Sort
View
PDC
2006
ACM
14 years 1 months ago
Oppositional and activist new media: remediation, reconfiguration, participation
Over the last decade, the major firms and cultural institutions that have dominated media and information industries in the U.S. and globally have been challenged by people adopti...
Leah A. Lievrouw
TRIDENTCOM
2005
IEEE
14 years 1 months ago
Integrated Network Experimentation using Simulation and Emulation
Discrete-event packet-level network simulation is well-known and widely used. Network emulation is a hybrid approach that combines real elements of a deployed networked applicatio...
Shashi Guruprasad, Robert Ricci, Jay Lepreau
MIR
2005
ACM
128views Multimedia» more  MIR 2005»
14 years 1 months ago
Content-based image retrieval: approaches and trends of the new age
The last decade has witnessed great interest in research on content-based image retrieval. This has paved the way for a large number of new techniques and systems, and a growing i...
Ritendra Datta, Jia Li, James Ze Wang
CIS
2005
Springer
14 years 1 months ago
ID-Based Restrictive Partially Blind Signatures
Restrictive blind signatures allow a recipient to receive a blind signature on a message not known to the signer but the choice of message is restricted and must conform to certain...
Xiaofeng Chen, Fangguo Zhang, Shengli Liu
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
14 years 1 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng