Sciweavers

222 search results - page 31 / 45
» Secure Content Delivery using Key Composition
Sort
View
EUROCRYPT
2010
Springer
14 years 12 days ago
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck W...
ACSAC
2005
IEEE
14 years 1 months ago
An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis
The Domain Name System (DNS) is the world’s largest distributed computing system that performs the key function of translating user-friendly domain names to IP addresses through...
Ramaswamy Chandramouli, Scott Rose
ICDCS
2006
IEEE
14 years 1 months ago
CREW: A Gossip-based Flash-Dissemination System
In this paper, we explore a new form of dissemination called Flash Dissemination that involves dissemination of fixed, rich information to a large number of recipients in as shor...
Mayur Deshpande, Bo Xing, Iosif Lazaridis, Bijit H...
ASIACRYPT
2000
Springer
13 years 12 months ago
Towards Signature-Only Signature Schemes
We consider a problem which was stated in a request for comments made by NIST in the FIPS97 document. The question is the following: Can we have a digital signature public key infr...
Adam Young, Moti Yung
MMM
2008
Springer
217views Multimedia» more  MMM 2008»
14 years 2 months ago
Emotion-Based Music Visualization Using Photos
Music players for personal computers are often featured with music visualization by generating animated patterns according to the music’s low-level features such as loudness and ...
Chin-Han Chen, Ming-Fang Weng, Shyh-Kang Jeng, Yun...