Sciweavers

977 search results - page 94 / 196
» Secret image sharing
Sort
View
154
Voted
SIGOPS
1998
123views more  SIGOPS 1998»
15 years 3 months ago
A New Family of Authentication Protocols
Abstract. We present a related family of authentication and digital signature protocols based on symmetric cryptographic primitives which perform substantially better than previous...
Ross J. Anderson, Francesco Bergadano, Bruno Crisp...
169
Voted
SCN
2010
Springer
142views Communications» more  SCN 2010»
15 years 2 months ago
How to Pair with a Human
We introduce a protocol, that we call Human Key Agreement, that allows pairs of humans to establish a key in a (seemingly hopeless) case where no public-key infrastructure is avail...
Stefan Dziembowski
138
Voted
ASIACRYPT
2010
Springer
15 years 1 months ago
Constant-Size Commitments to Polynomials and Their Applications
We introduce and formally define polynomial commitment schemes, and provide two efficient constructions. A polynomial commitment scheme allows a committer to commit to a polynomial...
Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
140
Voted
TIT
2011
128views more  TIT 2011»
14 years 10 months ago
Secure Network Coding on a Wiretap Network
—In the paradigm of network coding, the nodes in a network are allowed to encode the information received from the input links. With network coding, the full capacity of the netw...
Ning Cai, Raymond W. Yeung
140
Voted
RIAO
2007
15 years 5 months ago
Similarity Beyond Distance Measurement
One of the keys issues to content-based image retrieval is the similarity measurement of images. Images are represented as points in the space of low-level visual features and mos...
Feng Kang, Rong Jin, Steven C. H. Hoi