Sciweavers

83 search results - page 5 / 17
» ijnsec 2008
Sort
View
IJNSEC
2008
119views more  IJNSEC 2008»
13 years 6 months ago
Pass-Go: A Proposal to Improve the Usability of Graphical Passwords
Inspired by an old Chinese game, Go, we have designed a new graphical password scheme, Pass-Go, in which a user selects intersections on a grid as a way to input a password. While...
Hai Tao, Carlisle Adams
IJNSEC
2008
118views more  IJNSEC 2008»
13 years 6 months ago
Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols
Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof ...
Kim-Kwang Raymond Choo
IJNSEC
2008
85views more  IJNSEC 2008»
13 years 6 months ago
A Self-healing Key Distribution Scheme with Novel Properties
We improve a secret sharing scheme, which enables users select their personal keys by themselves instead of being distributed by group manager and users can reuse their personal k...
Biming Tian, Mingxing He
IJNSEC
2008
98views more  IJNSEC 2008»
13 years 6 months ago
A New General Transparency Model for Block-based Watermarking Method
Blocking artifact is one of the main drawbacks of the block-based watermarking method. Though a number of researches on "transparent" digital watermarking system have be...
Fangjun Huang
IJNSEC
2008
129views more  IJNSEC 2008»
13 years 6 months ago
Repairing Efficient Threshold Group Signature Scheme
To enhance the efficiency of threshold group signature schemes, Yu and Chen, recently, proposed an efficient threshold group signature scheme. By using elliptic curves, the propos...
Zuhua Shao