![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Design and Security Analysis of Anonymous Group Identification Protocols
Two provably secure group identification schemes are presented in this report: 1) we extend De Santis, Crescenzo and Persiano’s (SCP) anonymous group identification scheme to the discrete logarithm based case;...
-
Chapter and Conference Paper
Topic Learning from Few Examples
This paper describes a semi-supervised algorithm for single class learning with very few examples. The problem is formulated as a hierarchical latent variable model which is clipped to ignore classes not of in...
-
Chapter and Conference Paper
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model
In this paper, we provide the first committed signature provably secure in the standard complexity model based on the strong RSA assumption. The idea behind the construction is that given any valid partial sig...
-
Chapter and Conference Paper
Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks
In this paper, a refined sequential aggregate signature scheme from RSA that works for any modulus is presented, then a compact stimulation mechanism without a central, trusted authority for routing discovery ...
-
Chapter and Conference Paper
Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream
Multimedia community is moving from monolithic applications to more flexible and scalable integrated solutions. Stream authentication is more complex since a stream may consist of multiple sources and be trans...
-
Chapter and Conference Paper
Augmented Oblivious Polynomial Evaluation Protocol and Its Applications
In this paper, we first introduce a new notion called augmented oblivious polynomial evaluation (AOPE), a useful notion to deal with the general oblivious polynomial evaluation protocol. And then we propose a ...
-
Chapter and Conference Paper
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains
The contribution of this paper has two folds. In the first fold, we propose a generic construction of sequential aggregate signatures from families of certificated trapdoor one-way permutations. We show that o...
-
Chapter and Conference Paper
Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications
Privacy-preserving clustering algorithms group similar databases populated at distributed locations to improve data qualities and enable accurate data analysis and thus provide fundamental security components ...
-
Chapter and Conference Paper
Computing of Trust in Ad-Hoc Networks
Although, the notion of trust has been considered as a primitive for establishing relationships among nodes in ad-hoc networks, syntax and metrics of trust are not well defined. This paper studies computing of...
-
Chapter and Conference Paper
Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper)
At PODC’05, Subramanian, Katz, Roth, Shenker and Stoica (SKRSS) introduced and formulated a new theoretical problem called reliable broadcast problems in unknown fixed-identity networks [3] and further propose...
-
Chapter and Conference Paper
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures
In this paper, we first demonstrate a gap between the security of verifiably committed signatures in the two-party setting and the security of verifiably committed signatures in the multi-party setting. We the...
-
Chapter and Conference Paper
Adaptive and Composable Oblivious Transfer Protocols (Short Paper)
An adaptive k-out-of-n oblivious transfer protocol (OT \(_{k \times 1} ^n\) ) allows a receiver to obtain ...
-
Chapter and Conference Paper
Reasons of the Incremental Information in the Updating Spatial Database
In order to quickly extract and distribute the incremental information of spatial database, this work analyses the reasons of incremental information of spatial database with the instance of residential featur...
-
Chapter and Conference Paper
Research on the Collaboration Service Mechanism for Pig Diseases Diagnosis Based on Semantic Web
Distributed knowledge resources for the pig diseases diagnosis have the characteristics of heterogeneous, autonomy and difficult to be shared among different systems. Based on the web-based ontology modeling l...
-
Chapter and Conference Paper
Study on Aggressive Driving Activities at Crossroads in Bei**g
The objective of this study is to explore the influence of aggressive driving activities on microscopic traffic flow at crossroads in Bei**g. Thus, we performed observations and corresponding statistical anal...
-
Chapter and Conference Paper
The Research on Knowledge Diffusion Based on Small World Network
Small world is a sort of network between regular and random network that has the feature of both shorter characteristic path length and higher clustering coefficient, which is an appropriate model for the rese...
-
Chapter and Conference Paper
Sustainable Pseudo-random Number Generator
Barak and Halevi (BH) have proposed an efficient architecture for robust pseudorandom generators that ensure resilience in the presence of attackers with partial knowledge or partial controls of the generators...
-
Chapter and Conference Paper
Research and Realization on the Performance Testing Tool of Web Application
The performance guidelines such as the response time and the connection unsuccessful rate are the key factors to determine the quality of a Web application. To calculate these performance guidelines quickly, s...
-
Chapter and Conference Paper
Transitive Pseudonyms Mediated EHRs Sharing for Very Important Patients
Electronic health record (EHR) greatly enhances the convenience of cross-domain sharing and has been proven effectively to improve the quality of healthcare. On the other hand, the sharing of sensitive medical...