Sciweavers

1834 search results - page 58 / 367
» Public Key Cryptography
Sort
View
EGOV
2005
Springer
14 years 3 months ago
Electronic Voting: An All-Purpose Platform
It is generally considered that a key component of electronic government in the future will be electronic voting, as a means of facilitating the participation of citizens in electi...
Ricardo André Costa, Mário Jorge Lei...
ISPEC
2010
Springer
14 years 21 hour ago
Certificateless KEM and Hybrid Signcryption Schemes Revisited
Often authentication and confidentiality are required as simultaneous key requirements in many cryptographic applications. The cryptographic primitive called signcryption effective...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
ICISC
2007
100views Cryptology» more  ICISC 2007»
13 years 11 months ago
Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm
Pairing based cryptography is a new public key cryptographic scheme. An elliptic curve suitable for pairing based cryptography is called a “pairing-friendly” elliptic curve. Af...
Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi
CIG
2005
IEEE
14 years 3 months ago
How to Protect Peer-to-Peer Online Games from Cheats
Abstract- Recently, P2P (peer-to-peer) online game systems have attracted a great deal of public attention. They work without central servers, thus, the maintenance and organizatio...
Haruhiro Yoshimoto, Rie Shigetomi, Hideki Imai
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
13 years 7 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa