![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
2,884 Result(s)
-
Chapter and Conference Paper
Modified Finite Automata Public Key Cryptosystem
Finite Automata Public Key Cryptosystem (FAPKC) appeared about 10 years ago in Chinese literature. FAPKC possesses many advantageous features: it is a stream-cipher capable of high-speed operation and it has a...
-
Chapter and Conference Paper
A New Type of “Magic Ink” Signatures — Towards Transcript-Irrelevant Anonymity Revocation
The magic ink signature recently proposed in [11] is a blind signature which allows “unblinding” of a signature by authorities to establish what is known as audit trail and anonymity revocation in case of crimina...
-
Chapter and Conference Paper
Evolution of Fair Non-repudiation with TTP
Non-repudiation turns out to be an increasingly important security service with the fast growth of electronic commerce on the Internet. Non-repudiation services protect the transacting parties against any fals...
-
Chapter and Conference Paper
TimeCube-Efficient Storage, Access and Analysis of Temporal (Historical) Data
This paper introduces TimeCube-a technology product specifically designed for the analysis of master type data or dimensional data (such as customer information) which changes (in an aperiodic manner) over tim...
-
Chapter and Conference Paper
Cryptanalysis of “2R” Schemes
The function decomposition problem can be stated as: Given the algebraic expression of the composition of two map**s, how can we identify the two factors? This problem is believed to be in general intractable [
-
Chapter and Conference Paper
Cryptanalysis of Some AES Candidate Algorithms
Decorrelated Fast Cipher(DFC),LOKI97 and MAGENTA are candidates for the Advanced Encryption Standard(AES). In this paper we analyze their security respectively. Since cryptographic properties of the confusion ...
-
Chapter and Conference Paper
Multi-drop VPs for Multiparty Videoconferencing on SONET/ATM Rings -- Architectural Design and Bandwidth Demand Analysis
This paper proposes a scheme for implementing multiparty videoconferencing service on SONET/ATM rings. Different multicasting methods on SONET/ATM rings are discussed and compared. A new multicast VP called “M...
-
Chapter and Conference Paper
Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications
Demonstrating in zero-knowledge the possession of digital signatures has many cryptographic applications such as anonymous authentication, identity escrow, publicly verifiable secret sharing and group signatur...
-
Article
Scalability of Wavelength Division Multiplexed Optical Passive Star Networks with Range Limited Tunable Transceivers
The number of stations attached to a single optical passive star is limited by current state of the art in optical technology. Also, the wavelength range of tunable optical transceivers is limited by current t...
-
Chapter and Conference Paper
An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms
A verifiable encryption scheme (VES) is useful for many cryptographic protocols. A VES may be either for (encryption of) discrete logarithms or for (encryption of) e-th roots. So far, all the VESs for discrete lo...
-
Chapter and Conference Paper
Multimodal Interface Techniques in Content-Based Multimedia Retrieval
Multimodal interfaces (MI) can well improve the interactivity between users and computers through cooperation of different interactive devices and methods to exchange information and understand their requireme...
-
Chapter and Conference Paper
Face Recognition Based on Local Fisher Features
To efficiently solve human face image recognition problem with an image database, many techniques have been proposed. A key step in these techniques is the extraction of features for indexing in the database a...
-
Chapter and Conference Paper
Finding a Two-Core of a Tree in Linear Time
Let T be an edge-weighted tree. A p-core of T is a set of p mutually disjoint paths in T that minimizes the sum of the distances of all vertices in T from any of the p paths, where p≥1 is an integer. Let n be the...
-
Chapter and Conference Paper
Some Remarks on a Fair Exchange Protocol
Fair exchange turns out to be an increasingly important topic due to the rapid growth of electronic commerce. An exchange is deemed to be fair if at the end of exchange, either each party receives the expected...
-
Chapter and Conference Paper
Cryptanalysis of the m – Permutation Protection Schemes
Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP’98, Fung and Gray proposed an m-permutation protection scheme against the EEPROM modificatio...
-
Chapter and Conference Paper
A Novel Algorithm for Handwritten Chinese Character Recognition
2-D HMM methods have recently been applied to handwritten Chinese character recognition(HCCR) with much practical prospect, however, the time consuming is a great obstacle for its widely using. To overcome thi...
-
Chapter and Conference Paper
Cryptanalysis of Polynomial Authentication and Signature Scheme
Polynomial Authentication and Signature Scheme (PASS) is a new public key authentication and signature scheme proposed by NTRU Cryptosystems Inc. It is based on the hard problems related to constrained polynom...
-
Chapter
Dependable Distributed and Mobile Computing — Utilizing Time to Enhance Recovery from Failures
Mobile computing allows ubiquitous and continuous access to computing resources while users travel or work at a client’s site. The flexibility introduced by mobile computing brings new challenges to dependabil...
-
Chapter and Conference Paper
An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods
It is commonly acknowledged that customers’ privacy in electronic commerce should be well protected. The solutions may come not only from the ethics education and legislation, but also from cryptographic techn...
-
Chapter and Conference Paper
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues
With the rapid growth of broadband infrastructure, it is thought that the bottleneck for video-on-demand service through Internet is being cleared. However, digital video content protection and consumers priva...