Skip to main content

Page of 145
and
  1. No Access

    Chapter and Conference Paper

    Modified Finite Automata Public Key Cryptosystem

    Finite Automata Public Key Cryptosystem (FAPKC) appeared about 10 years ago in Chinese literature. FAPKC possesses many advantageous features: it is a stream-cipher capable of high-speed operation and it has a...

    Feng Bao, Robert H. Deng, **ang Gao, Yoshihide Igarashi in Information Security (1998)

  2. No Access

    Chapter and Conference Paper

    A New Type of “Magic Ink” Signatures — Towards Transcript-Irrelevant Anonymity Revocation

    The magic ink signature recently proposed in [11] is a blind signature which allows “unblinding” of a signature by authorities to establish what is known as audit trail and anonymity revocation in case of crimina...

    Feng Bao, Robert H. Deng in Public Key Cryptography (1999)

  3. No Access

    Chapter and Conference Paper

    Evolution of Fair Non-repudiation with TTP

    Non-repudiation turns out to be an increasingly important security service with the fast growth of electronic commerce on the Internet. Non-repudiation services protect the transacting parties against any fals...

    Jianying Zhou, Robert Deng, Feng Bao in Information Security and Privacy (1999)

  4. No Access

    Chapter and Conference Paper

    TimeCube-Efficient Storage, Access and Analysis of Temporal (Historical) Data

    This paper introduces TimeCube-a technology product specifically designed for the analysis of master type data or dimensional data (such as customer information) which changes (in an aperiodic manner) over tim...

    Y. Ishii, T. Ishizaka, N. Mohan, J. Feng in Advances in Database Technologies (1999)

  5. Chapter and Conference Paper

    Cryptanalysis of “2R” Schemes

    The function decomposition problem can be stated as: Given the algebraic expression of the composition of two map**s, how can we identify the two factors? This problem is believed to be in general intractable [

    Ye Ding-Feng, Lam Kwok-Yan, Dai Zong-Duo in Advances in Cryptology — CRYPTO’ 99 (1999)

  6. No Access

    Chapter and Conference Paper

    Cryptanalysis of Some AES Candidate Algorithms

    Decorrelated Fast Cipher(DFC),LOKI97 and MAGENTA are candidates for the Advanced Encryption Standard(AES). In this paper we analyze their security respectively. Since cryptographic properties of the confusion ...

    Wenling Wu, Bao Li, Denguo Feng, Sihan Qing in Information and Communication Security (1999)

  7. No Access

    Chapter and Conference Paper

    Multi-drop VPs for Multiparty Videoconferencing on SONET/ATM Rings -- Architectural Design and Bandwidth Demand Analysis

    This paper proposes a scheme for implementing multiparty videoconferencing service on SONET/ATM rings. Different multicasting methods on SONET/ATM rings are discussed and compared. A new multicast VP called “M...

    Gang Feng, Tak-Shing Peter Yum in Interactive Distributed Multimedia Systems… (1999)

  8. No Access

    Chapter and Conference Paper

    Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications

    Demonstrating in zero-knowledge the possession of digital signatures has many cryptographic applications such as anonymous authentication, identity escrow, publicly verifiable secret sharing and group signatur...

    Khanh Quoc Nguyen, Feng Bao, Yi Mu in Information and Communication Security (1999)

  9. No Access

    Article

    Scalability of Wavelength Division Multiplexed Optical Passive Star Networks with Range Limited Tunable Transceivers

    The number of stations attached to a single optical passive star is limited by current state of the art in optical technology. Also, the wavelength range of tunable optical transceivers is limited by current t...

    Allalaghatta Pavan, Feng Cao, David H.C. Du in Photonic Network Communication (1999)

  10. No Access

    Chapter and Conference Paper

    An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms

    A verifiable encryption scheme (VES) is useful for many cryptographic protocols. A VES may be either for (encryption of) discrete logarithms or for (encryption of) e-th roots. So far, all the VESs for discrete lo...

    Feng Bao in Smart Card Research and Applications (2000)

  11. No Access

    Chapter and Conference Paper

    Multimodal Interface Techniques in Content-Based Multimedia Retrieval

    Multimodal interfaces (MI) can well improve the interactivity between users and computers through cooperation of different interactive devices and methods to exchange information and understand their requireme...

    **chang Ren, Rongchun Zhao in Advances in Multimodal Interfaces — ICMI 2… (2000)

  12. No Access

    Chapter and Conference Paper

    Face Recognition Based on Local Fisher Features

    To efficiently solve human face image recognition problem with an image database, many techniques have been proposed. A key step in these techniques is the extraction of features for indexing in the database a...

    Dao-Qing Dai, Guo-Can Feng, Jian-Huang Lai in Advances in Multimodal Interfaces — ICMI 2… (2000)

  13. No Access

    Chapter and Conference Paper

    Finding a Two-Core of a Tree in Linear Time

    Let T be an edge-weighted tree. A p-core of T is a set of p mutually disjoint paths in T that minimizes the sum of the distances of all vertices in T from any of the p paths, where p≥1 is an integer. Let n be the...

    Biing-Feng Wang, Jyh-Jye Lin in Algorithms and Computation (2000)

  14. Chapter and Conference Paper

    Some Remarks on a Fair Exchange Protocol

    Fair exchange turns out to be an increasingly important topic due to the rapid growth of electronic commerce. An exchange is deemed to be fair if at the end of exchange, either each party receives the expected...

    Jianying Zhou, Robert Deng, Feng Bao in Public Key Cryptography (2000)

  15. No Access

    Chapter and Conference Paper

    Cryptanalysis of the m – Permutation Protection Schemes

    Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP’98, Fung and Gray proposed an m-permutation protection scheme against the EEPROM modificatio...

    Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng in Information Security and Privacy (2000)

  16. No Access

    Chapter and Conference Paper

    A Novel Algorithm for Handwritten Chinese Character Recognition

    2-D HMM methods have recently been applied to handwritten Chinese character recognition(HCCR) with much practical prospect, however, the time consuming is a great obstacle for its widely using. To overcome thi...

    Feng Qi, Minghua Deng, Min** Qian in Advances in Multimodal Interfaces — ICMI 2… (2000)

  17. No Access

    Chapter and Conference Paper

    Cryptanalysis of Polynomial Authentication and Signature Scheme

    Polynomial Authentication and Signature Scheme (PASS) is a new public key authentication and signature scheme proposed by NTRU Cryptosystems Inc. It is based on the hard problems related to constrained polynom...

    Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng in Information Security and Privacy (2000)

  18. No Access

    Chapter

    Dependable Distributed and Mobile Computing — Utilizing Time to Enhance Recovery from Failures

    Mobile computing allows ubiquitous and continuous access to computing resources while users travel or work at a client’s site. The flexibility introduced by mobile computing brings new challenges to dependabil...

    W. Kent Fuchs, Nuno Neves, Kuo-Feng Ssu in Dependable Network Computing (2000)

  19. No Access

    Chapter and Conference Paper

    An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods

    It is commonly acknowledged that customers’ privacy in electronic commerce should be well protected. The solutions may come not only from the ethics education and legislation, but also from cryptographic techn...

    Feng Bao, Robert H. Deng, Peirong Feng in Information Security and Cryptology — ICISC 2000 (2001)

  20. No Access

    Chapter and Conference Paper

    Secure and Private Distribution of Online Video and Some Related Cryptographic Issues

    With the rapid growth of broadband infrastructure, it is thought that the bottleneck for video-on-demand service through Internet is being cleared. However, digital video content protection and consumers priva...

    Feng Bao, Robert Deng, Peirong Feng, Yan Guo in Information Security and Privacy (2001)

Page of 145