Bent functions are used to build blocks for cryptographically strong S-boxes and spread spectrum systems. the concept of semi bent functions and quarter bent functions is presented. Based on the new concept, an approa...
详细信息
In the traditional system, for some indigenous error in the measurement and trajectory track, the precision of trajectory parameters is not enough high so that it often results in some false alarms for the safety of r...
详细信息
Many restrictive partially blind signatures have been proposed till now. But all existing restrictive partially blind signature schemes were constructed under certificate-based public key systems. Recently, Chen et al...
详细信息
Fault-tolerance is an important property of conference key distribution protocol. Recently, Yang et al. proposed an identity-based fault-tolerant conference key distribution scheme which is much different to the tradi...
详细信息
Knowledge reduction is one of the most important issues in rough sets theory. Many works are related to connection-degree-based rough sets model to treat incomplete information systems. However, the model is not used ...
详细信息
In traditional symmetric watermarking schemes, the key used for watermark embedding must be available at the watermark detector. this leads to a security problem if the detectors are implemented in consumer devices th...
详细信息
the threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, based...
详细信息
In this paper, we propose two certificateless aggregate signature schemes, which are the first aggregate signature schemes in the CL-PKC. the first scheme CAS -1 reduces the costs of communication and signer-side comp...
详细信息
this paper evaluates the performance of TriBA - a new idea in multiprocessor architectures. TriBA is considered to be a high performance, scalable parallel computing architecture, therefore, its performance is evaluat...
详细信息
As is well known, computer security has been given more attention;many mechanisms have been developed to increase P2P security like encryption, sandboxing, reputation, and firewall. Among those technologies, reputatio...
详细信息
暂无评论