Sciweavers

977 search results - page 54 / 196
» Secret image sharing
Sort
View
ASPDAC
2010
ACM
133views Hardware» more  ASPDAC 2010»
15 years 2 months ago
Checker-pattern and shared two pixels LOFIC CMOS image sensors
Yoshiaki Tashiro, Shun Kawada, Shin Sakai, Shigeto...
FC
2004
Springer
94views Cryptology» more  FC 2004»
15 years 9 months ago
The Ephemeral Pairing Problem
Abstract In wireless ad-hoc broadcast networks the pairing problem consists of establishing a (long-term) connection between two specific physical nodes in the network that do not...
Jaap-Henk Hoepman
CTRSA
2001
Springer
120views Cryptology» more  CTRSA 2001»
15 years 8 months ago
Forward-Secure Threshold Signature Schemes
We consider the usage of forward security with threshold signature schemes. This means that even if more than the threshold number of players are compromised, some security remain...
Michel Abdalla, Sara K. Miner, Chanathip Namprempr...
ASIACRYPT
2000
Springer
15 years 8 months ago
Distributed Oblivious Transfer
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect th...
Moni Naor, Benny Pinkas