Sciweavers

525 search results - page 5 / 105
» Threshold Schemes with Disenrollment
Sort
View
ICITS
2009
13 years 4 months ago
Linear Threshold Multisecret Sharing Schemes
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here un...
Oriol Farràs, Ignacio Gracia, Sebasti&agrav...
GLOBECOM
2010
IEEE
13 years 5 months ago
Methods of Selecting Threshold for the QoE-Based Video Output Scheme SCS
SCS is a video output scheme which is designed to maximize QoE in audio-video IP transmission; it is featured by the applicability to end
Shuji Tasaka, Akifumi Hirashima
ISMAR
2008
IEEE
14 years 1 months ago
Perception thresholds for augmented reality navigation schemes in large distances
Because the resolution of see-through displays is lower than the resolution of the human eye, perception of AR schemes is complicated in large distances. To discover, how design i...
Marcus Tönnis, Leslie Klein, Gudrun Klinker
AFRICACRYPT
2008
Springer
14 years 1 months ago
Robust Threshold Schemes Based on the Chinese Remainder Theorem
Kamer Kaya, Ali Aydin Selçuk
PKC
2001
Springer
86views Cryptology» more  PKC 2001»
13 years 11 months ago
One Round Threshold Discrete-Log Key Generation without Private Channels
Pedersen designed the first scheme for generating Discrete-Log keys without
Pierre-Alain Fouque, Jacques Stern