Sciweavers

525 search results - page 29 / 105
» Threshold Schemes with Disenrollment
Sort
View
NCA
2007
IEEE
14 years 4 months ago
Dynamic load balancing for network intrusion detection systems based on distributed architectures
Increasing traffic and the necessity of stateful analyses impose strong computational requirements on network intrusion detection systems (NIDS), and motivate the need of distrib...
Mauro Andreolini, Sara Casolari, Michele Colajanni...
CORR
2011
Springer
169views Education» more  CORR 2011»
13 years 5 months ago
Strict Authentication Watermarking with JPEG Compression (SAW-JPEG) for Medical Images
This paper proposes a strict authentication watermarking for medical images. In this scheme, we define region of interest (ROI) by taking the smallest rectangle around an image. T...
Jasni Mohamad Zain
SIGMOD
2002
ACM
134views Database» more  SIGMOD 2002»
14 years 10 months ago
Wavelet synopses with error guarantees
Recent work has demonstrated the effectiveness of the wavelet decomposition in reducing large amounts of data to compact sets of wavelet coefficients (termed "wavelet synopse...
Minos N. Garofalakis, Phillip B. Gibbons
EUROCRYPT
2008
Springer
13 years 12 months ago
Threshold RSA for Dynamic and Ad-Hoc Groups
Abstract--We consider the use of threshold signatures in adhoc and dynamic groups such as MANETs ("mobile ad-hoc networks"). We first show that known threshold RSA signat...
Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal R...
AAECC
2006
Springer
77views Algorithms» more  AAECC 2006»
13 years 10 months ago
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
A new framework for protection against key exposure was recently suggested by Dodis et. al. [16]. We take its realization further towards practice by presenting simple new schemes...
Mihir Bellare, Adriana Palacio