Sciweavers

977 search results - page 92 / 196
» Secret image sharing
Sort
View
116
Voted
CSCW
1996
ACM
15 years 7 months ago
FreeWalk: Supporting Casual Meetings in a Network
FreeWalk is a desktop meeting environment to support informal communication. FreeWalk provides a 3-D community common where everybody can meet and can behave just as they do in re...
Hideyuki Nakanishi, Chikara Yoshida, Toshikazu Nis...
129
Voted
CRYPTO
1994
Springer
98views Cryptology» more  CRYPTO 1994»
15 years 7 months ago
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
Suppose we are given a proof of knowledge P in which a prover demonstrates that he knows a solution to a given problem instance. Suppose also that we have a secret sharing scheme S...
Ronald Cramer, Ivan Damgård, Berry Schoenmak...
144
Voted
CCS
2006
ACM
15 years 7 months ago
An efficient key establishment scheme for secure aggregating sensor networks
Key establishment is a fundamental prerequisite for secure communication in wireless sensor networks. A new node joining the network needs to efficiently and autonomously set up s...
Erik-Oliver Blaß, Martina Zitterbart
122
Voted
EUROCRYPT
2000
Springer
15 years 7 months ago
Noisy Polynomial Interpolation and Noisy Chinese Remaindering
Abstract. The noisy polynomial interpolation problem is a new intractability assumption introduced last year in oblivious polynomial evaluation. It also appeared independently in p...
Daniel Bleichenbacher, Phong Q. Nguyen
147
Voted
ACNS
2008
Springer
96views Cryptology» more  ACNS 2008»
15 years 5 months ago
Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns
Abstract. "Pairing" is referred to as the operation of achieving authenticated key agreement between two human-operated devices over a short- or medium-range wireless com...
Ramnath Prasad, Nitesh Saxena