Sciweavers

1970 search results - page 49 / 394
» Security Without Firewalls
Sort
View
TCSV
2008
111views more  TCSV 2008»
13 years 9 months ago
Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion
Recently, a novel image scrambling (i.e., encryption) scheme without bandwidth expansion was proposed based on two-dimensional (2-D) discrete prolate spheroidal sequences (DPSS). ...
Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Ch...
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 7 months ago
An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password
This paper presents an entire chaos-based biometric remote user authentication scheme on tokens without using passwords. The proposed scheme is based on the chaotic hash function a...
Eun-Jun Yoon, Kee-Young Yoo
MUE
2007
IEEE
113views Multimedia» more  MUE 2007»
14 years 4 months ago
An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards
In 2003, Yang, Chang, and Hwang proposed an enhanced scheme of Peyravivan-Zunic’s password authentication scheme by using the Diffie-Hellman scheme. Later, Yoon, Ryu, and Yoo de...
Chin-Chen Chang, Hao-Chuan Tsai, Yi-Hui Chen
INDOCRYPT
2003
Springer
14 years 2 months ago
Practical Mental Poker Without a TTP Based on Homomorphic Encryption
A solution for obtaining impartial random values in on-line gambling is presented in this paper. Unlike most previous proposals, our method does not require any TTP and allows e-ga...
Jordi Castellà-Roca, Josep Domingo-Ferrer, ...
CRYPTO
2006
Springer
224views Cryptology» more  CRYPTO 2006»
14 years 1 months ago
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the...
Xavier Boyen, Brent Waters