نتایج جستجو برای: tamper resilient cryptography

تعداد نتایج: 54844  

2016
B. Pushpa Devi Kh. Manglem Singh Sudipta Roy

This paper proposes a new watermarking algorithm based on the shuffled singular value decomposition and the visual cryptography for copyright protection of digital images. It generates the ownership and identification shares of the image based on visual cryptography. It decomposes the image into low and high frequency sub-bands. The low frequency sub-band is further divided into blocks of same ...

Journal: :international journal of transportation engineering 0
hasan taherkhani assistant professor, department of civil engineering, zanjan university, zanjan, iran fereydoon moghadas nejad associate professor, department of civil and environmental engineering, amirkabir industrial university, tehran, iran ali khodaii associate professor, department of civil and environmental engineering, amirkabir industrial university, tehran, iran arash saleh ahari msc. student, department of civil engineering, zanjan university, zanjan, iran

resilient modulus of pavement materials is a key property required for the pavement thickness design. this paper describes the results of an experimental study on the effects of temperature and loading frequency on the resilient modulus of a sbs polymer modified asphalt concrete under dry and saturated conditions. dynamic creep tests were conducted on dry and saturated specimens of the mixture ...

Journal: :IEICE Electronics Express 2017

Journal: :Canadian Pharmacists Journal / Revue des Pharmaciens du Canada 2013

2005
Tsuyoshi Takagi Erik Dahmen Andreas Müller

Since the internet was made accessible for the public, it is used more and more for the exchange of confidential data. Over the past few years, the number of electronic frauds increased and nowadays poses a serious threat. It is therefore extremely important to have methods to secure transactions and communications made via the internet, or in general in any electronic environment. The science ...

2008
Jin Li Kwangjo Kim

Fuzzy identity-based encryption (FIBE) has found many applications, such as biometric-based encryption, since its notion was firstly proposed by Sahai and Waters [15]. In this paper, we show how to minimize the damage of secret key exposure in FIBE. We introduce a new notion which we call fuzzy identity-based key-insulated encryption (FIBKIE). In FIB-KIE, the secret key associated with an ident...

Journal: :Baghdad Science Journal 2008

2008

Laser-imploded targets, especially those imploded adiabatically, attain high temperatures in the compressed core. The imploded part of the surrounding tamper is considerably colder, especially if preheat is small. Under these conditions the continuous x-ray emission from the core undergoes absorption at wavelengths characteristic of atomic species in the tamper. The resulting absorption lines c...

2011
Nico Döttling Daniel Kraschewski Jörn Müller-Quade

Cryptographic assumptions regarding tamper proof hardware tokens have gained increasing attention. Even if the tamper-proof hardware is issued by one of the parties, and hence not necessarily trusted by the other, many tasks become possible: Tamper proof hardware is sufficient for universally composable protocols, for information-theoretically secure protocols, and even allow to create software...

Journal: :IACR Cryptology ePrint Archive 2011
Ivan Damgård Carmit Hazay Arpita Patra

In the traditional secure function evaluation setting, some set of distrusting parties jointly compute a function of their respective inputs securely as if the computation is executed in an ideal setting where the parties send inputs to a trusted party that performs the computation and returns its result. Almost independently of secure computation, the area of leakage resilient cryptography has...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید