نتایج جستجو برای: tamper resilient cryptography
تعداد نتایج: 54844 فیلتر نتایج به سال:
This paper proposes a new watermarking algorithm based on the shuffled singular value decomposition and the visual cryptography for copyright protection of digital images. It generates the ownership and identification shares of the image based on visual cryptography. It decomposes the image into low and high frequency sub-bands. The low frequency sub-band is further divided into blocks of same ...
resilient modulus of pavement materials is a key property required for the pavement thickness design. this paper describes the results of an experimental study on the effects of temperature and loading frequency on the resilient modulus of a sbs polymer modified asphalt concrete under dry and saturated conditions. dynamic creep tests were conducted on dry and saturated specimens of the mixture ...
Since the internet was made accessible for the public, it is used more and more for the exchange of confidential data. Over the past few years, the number of electronic frauds increased and nowadays poses a serious threat. It is therefore extremely important to have methods to secure transactions and communications made via the internet, or in general in any electronic environment. The science ...
Fuzzy identity-based encryption (FIBE) has found many applications, such as biometric-based encryption, since its notion was firstly proposed by Sahai and Waters [15]. In this paper, we show how to minimize the damage of secret key exposure in FIBE. We introduce a new notion which we call fuzzy identity-based key-insulated encryption (FIBKIE). In FIB-KIE, the secret key associated with an ident...
Laser-imploded targets, especially those imploded adiabatically, attain high temperatures in the compressed core. The imploded part of the surrounding tamper is considerably colder, especially if preheat is small. Under these conditions the continuous x-ray emission from the core undergoes absorption at wavelengths characteristic of atomic species in the tamper. The resulting absorption lines c...
Cryptographic assumptions regarding tamper proof hardware tokens have gained increasing attention. Even if the tamper-proof hardware is issued by one of the parties, and hence not necessarily trusted by the other, many tasks become possible: Tamper proof hardware is sufficient for universally composable protocols, for information-theoretically secure protocols, and even allow to create software...
In the traditional secure function evaluation setting, some set of distrusting parties jointly compute a function of their respective inputs securely as if the computation is executed in an ideal setting where the parties send inputs to a trusted party that performs the computation and returns its result. Almost independently of secure computation, the area of leakage resilient cryptography has...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید