Sciweavers

563 search results - page 39 / 113
» Verifiable Signature Sharing
Sort
View
BIB
2007
59views more  BIB 2007»
13 years 9 months ago
Statistically designing microarrays and microarray experiments to enhance sensitivity and specificity
Gene expression signatures from microarray experiments promise to provide important prognostic tools for predicting disease outcome or response to treatment. A number of microarra...
Jason C. Hsu, Jane Chang, Tao Wang, Eiríkur...
NDSS
2003
IEEE
14 years 2 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
AINA
2007
IEEE
14 years 3 months ago
Reducing the Complexity in the Distributed Multiplication Protocol of Two Polynomially Shared Values
The multiparty multiplication of two polynomially shared values over Zq with a public prime number q is an important module in distributed computations. The multiplication protoco...
Peter Lory
AAECC
2004
Springer
76views Algorithms» more  AAECC 2004»
13 years 8 months ago
On the Security of RSA with Primes Sharing Least-Significant Bits
Abstract. We investigate the security of a variant of the RSA public-key cryptosystem called LSBS-RSA, in which the modulus primes share a large number of least-significant bits.We...
Ron Steinfeld, Yuliang Zheng
INFOCOM
2006
IEEE
14 years 2 months ago
Cooperative Security for Network Coding File Distribution
Abstract— Peer-to-peer content distribution networks can suffer from malicious participants that corrupt content. Current systems verify blocks with traditional cryptographic sig...
Christos Gkantsidis, Pablo Rodriguez