Results 41 to 49 of about 115 (49)

Using shifted conjugacy in braid-based cryptography

open access: yes, 2006
Conjugacy is not the only possible primitive for designing braid-based protocols. To illustrate this principle, we describe a Fiat--Shamir-style authentication protocol that be can be implemented using any binary operation that satisfies the left self ...
Dehornoy, Patrick
core   +1 more source

A New Watermarking Algorithm Based on Human Visual System for Content Integrity Verification of Region of Interest [PDF]

open access: yes, 2012
This paper proposes a semi-fragile, robust-to-JPEG2000 compression watermarking method which is based on the Human Visual System (HVS). This method is designed to verify the content integrity of Region of Interest (ROI) in tele-radiology images.
Fatemizadeh, Emad, Maneshi, Mona
core   +1 more source

Probabilistic Infinite Secret Sharing

open access: yes, 2013
The study of probabilistic secret sharing schemes using arbitrary probability spaces and possibly infinite number of participants lets us investigate abstract properties of such schemes.
Csirmaz, László
core  

Sum graph based access structure in a secret sharing scheme [PDF]

open access: yes
Secret sharing scheme is a method to distribute secret information to a set P of participants so that only authorised subsets of P can reconstruct the secret.
Miller, Mirka   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy