Sciweavers

977 search results - page 60 / 196
» Secret image sharing
Sort
View
128
Voted
ICCSA
2009
Springer
15 years 10 months ago
On a Construction of Short Digests for Authenticating Ad Hoc Networks
In pervasive ad-hoc networks, there is a need for devices to be able to communicate securely, despite the lack of apriori shared security associations and the absence of an infrast...
Khoongming Khoo, Ford-Long Wong, Chu-Wee Lim
HOST
2009
IEEE
15 years 10 months ago
Secure IP-Block Distribution for Hardware Devices
—EDA vendors have proposed a standard for the sharing of IP among vendors to be used in the design and development of IP for FPGAs. Although, we do not propose any attacks, we sh...
Jorge Guajardo, Tim Güneysu, Sandeep S. Kumar...
ITNG
2007
IEEE
15 years 10 months ago
Securing MPLS Networks with Multi-path Routing
— MPLS security is an evolving issue which has been raised by many researchers and service providers. The basic architecture of MPLS network does not provide security services su...
Sahel Alouneh, Abdeslam En-Nouaary, Anjali Agarwal
ASIACRYPT
2003
Springer
15 years 7 months ago
Efficient Group Signatures without Trapdoors
Abstract. Group signature schemes are fundamental cryptographic tools that enable unlinkably anonymous authentication, in the same fashion that digital signatures provide the basis...
Giuseppe Ateniese, Breno de Medeiros
CBMS
2005
IEEE
15 years 6 months ago
Supporting Collaboration and Information Sharing in Computer-Based Clinical Guideline Management
Collaboration and information sharing for facilitating patient and clinician mobility is important to consider in supporting computer-based clinical guidelines and protocols. This...
Kudakwashe Dube, Essam Mansour, Bing Wu