Results 31 to 40 of about 10,103,841 (323)

Coalition Formation in a Legislative Voting Game [PDF]

open access: yes, 2013
We experimentally investigate the Jackson-Moselle (2002) model where legislators bargain over policy proposals and the allocation of private goods. Key comparative static predictions of the model hold as policy proposals shift in the predicted direction ...
Christiansen, N.   +2 more
core   +2 more sources

Signature schemes with a fuzzy private key

open access: yesInternational Journal of Information Security, 2019
In this paper, we introduce a new concept of digital signature that we call fuzzy signature, which is a signature scheme that uses a noisy string such as biometric data as a private key, but does not require user-specific auxiliary data (which is also ...
Kenta Takahashi   +4 more
semanticscholar   +1 more source

A Private Key Management Scheme on Blockchain Against Collusion Attacks [PDF]

open access: yesJisuanji gongcheng, 2020
To address the security of the recovery of lost private keys on the blockchain,this paper proposes a distributed management scheme for private keys based on threshold secret sharing.The scheme combines the user’s private key with the secret password as a
ZHOU Jian, QU Ran
doaj   +1 more source

Forward-Security in Private-Key Cryptography [PDF]

open access: yes, 2002
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure.
A. Desai   +14 more
core   +2 more sources

Improving the security of LSB image steganography

open access: yesJOIV: International Journal on Informatics Visualization, 2019
Steganography is the technique of hiding secret data (message) within any media such as digital color image. In this paper we will merge steganography process with cryptography process in order to increase the security of the proposed method.
Jamil Al-Azzeh   +3 more
doaj   +1 more source

Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures

open access: yesIET Information Security, 2021
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges.
Ferucio Laurenţiu Ţiplea   +1 more
doaj   +1 more source

New, efficient and robust, fiber-based quantum key distribution schemes [PDF]

open access: yes, 2002
We present a new fiber based quantum key distribution (QKD) scheme which can be regarded as a modification of an idea proposed by Inoue, Waks and Yamamoto (IWY) [1].
Bennett   +28 more
core   +2 more sources

F2Key: Dynamically Converting Your Face into a Private Key Based on COTS Headphones for Reliable Voice Interaction

open access: yesACM SIGMOBILE International Conference on Mobile Systems, Applications, and Services
In this paper, we proposed F2Key, the first earable physical security system based on commercial off-the-shelf headphones. F2Key enables impactful applications, such as enhancing voiceprint-based authentication systems, reliable voice assistants, audio ...
Di Duan   +6 more
semanticscholar   +1 more source

Arabic Text Encryption Using Artificial Neural Networks [PDF]

open access: yesEngineering and Technology Journal, 2016
This research aims to build a cipher system using back propagation Algorithm with artificial neural network to encrypt any Arabic text and to prevent any data attack during the transition process.Encryption information holdsfour stages: 1)A neural ...
Oday Kamil Hamid
doaj   +1 more source

A New Secret key Agreement Scheme in a Four-Terminal Network

open access: yes, 2011
A new scenario for generating a secret key and two private keys among three Terminals in the presence of an external eavesdropper is considered. Terminals 1, 2 and 3 intend to share a common secret key concealed from the external eavesdropper (Terminal 4)
Aref, Mohammad Reza   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy