• No results found

[PDF] Top 20 Efficient Data Integrity Using Enhanced Secret Sharing Scheme for MANET

Has 10000 "Efficient Data Integrity Using Enhanced Secret Sharing Scheme for MANET" found on our website. Below are the top 20 most common "Efficient Data Integrity Using Enhanced Secret Sharing Scheme for MANET".

Efficient Data Integrity Using Enhanced Secret Sharing Scheme for MANET

Efficient Data Integrity Using Enhanced Secret Sharing Scheme for MANET

... Using the routing AODV protocol, node B claims that it has the routing to the destination node every time it gets Route Request packets, and sends the response to source node immediately[r] ... See full document

9

Shared Cryptographic Scheme with Efficient Data Recovery and Compression for Audio Secret Sharing

Shared Cryptographic Scheme with Efficient Data Recovery and Compression for Audio Secret Sharing

... These questions arose since it has been proven many times that data on the internet is not safe, data can be easily tampered. For this reason we use the different cryptographic techniques. Traditionally, ... See full document

7

Enabling Efficient User Revocation and Unblocking of Authorized User

Enabling Efficient User Revocation and Unblocking of Authorized User

... share data with each ...shared data to allow public integrity ...the secret values of the existing users. A novel public auditing scheme for the integrity of shared data ... See full document

6

Secure and Efficient Steganography Scheme using 2 out of 2 Secret Sharing Method

Secure and Efficient Steganography Scheme using 2 out of 2 Secret Sharing Method

... a scheme of steganography which is based on secret ...decrypt data in order to keep the message ...message secret, it may also be necessary to keep the existence of the message ...and ... See full document

9

A HYBRID METHOD OF LINGUISTIC APPROACH AND STATISTICAL METHOD FOR NESTED NOUN 
COMPOUND EXTRACTION

A HYBRID METHOD OF LINGUISTIC APPROACH AND STATISTICAL METHOD FOR NESTED NOUN COMPOUND EXTRACTION

... New Enhanced Proactive Secret Sharing scheme to detect the black hole ...of data packets and data integrity is provided using the proposed secret ... See full document

8

DISTRIBUTED CERTIFICATE AUTHORITY IN CLUSTER-BASED MANET USING MULTI SECRET SHARING SCHEME

DISTRIBUTED CERTIFICATE AUTHORITY IN CLUSTER-BASED MANET USING MULTI SECRET SHARING SCHEME

... verifiable secret sharing schemes (VSS), the validity of the shares is checked before the reconstruction pro- cess, many works are introduced in this ...multi secret sharing schemes (VMSS); ... See full document

9

THE MODIFIED SECURITY SCHEME FOR DATA INTEGRITY IN MANET

THE MODIFIED SECURITY SCHEME FOR DATA INTEGRITY IN MANET

... an enhanced distributed certificate authority scheme to provide data integrity, thus making the network more secure from both inside and outside ...proposed scheme makes use of Shamir’s ... See full document

9

An  Efficient $t$-Cheater  Identifiable  Secret  Sharing  Scheme  with  Optimal  Cheater  Resiliency

An Efficient $t$-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency

... In fact, this method was used by Rabin and Ben-Or [21], but Carpentieri [6] observed that the authentication code can be used more cleverly. Instead of first choosing the authentication key and then calculating the ... See full document

9

Applied Cryptography & Network Security   2nd International Conference, ACNS 2004 pdf

Applied Cryptography & Network Security 2nd International Conference, ACNS 2004 pdf

... An approach that uses BGP to propagate source addresses that can be used for filtering out source-spoofed packets inside the Internet core [26] places undue burden on the core and is useful only in weeding out spoofed ... See full document

525

Space  Efficient  Computational  Multi-Secret  Sharing   and  Its   Applications

Space Efficient Computational Multi-Secret Sharing and Its Applications

... an efficient instantiation of DTPKE, and obtaining such a scheme appears to be ...the scheme requires O(n) public group elements, called the combining key, and all elements in the combining key are ... See full document

24

Additively  Homomorphic  UC  commitments  with  Optimal  Amortized  Overhead

Additively Homomorphic UC commitments with Optimal Amortized Overhead

... commit phase that are not consistent sharings of any value. Nevertheless, when some of these shares are added, we may get values that do in fact form valid commitments, and this may allow the committer to cheat. To solve ... See full document

38

A SIMPLE AND EFFICIENT VISUAL CRYPTOGRAPHY SCHEME FOR SHARING MULTIPLE SECRET IMAGES

A SIMPLE AND EFFICIENT VISUAL CRYPTOGRAPHY SCHEME FOR SHARING MULTIPLE SECRET IMAGES

... www.wjert.org 56 without any visual abnormality. The above mentioned scheme is implemented into “MATLAB R2009a”. All that is required is to transmit key on a secret channel while encrypted form can be ... See full document

7

An Explication of Multifarious Secret Sharing Schemes

An Explication of Multifarious Secret Sharing Schemes

... of secret sharing is to start with a secret, divide it into pieces called shares, which are then distributed amongst participants by the ...original secret. Applications for secret ... See full document

5

Efficient Verifiable Secret Sharing Scheme over Bilinear Groups

Efficient Verifiable Secret Sharing Scheme over Bilinear Groups

... Secret sharing is a way of distributing information to a set of processors such that a quorum of processors is needed to access the ...verifiable secret sharing scheme is a ... See full document

9

Enhanced Contrast of Reconstructed Image for Image Secret Sharing Scheme Using Mathematical Morphology

Enhanced Contrast of Reconstructed Image for Image Secret Sharing Scheme Using Mathematical Morphology

... our scheme assures improved contrast for classical VSS, size of SE plays a significant ...image, secret message width should be higher than experimental SE size else secret message erodes in first ... See full document

7

An  Efficient  Multistage  Secret  Sharing  Scheme  Using  Linear  One-way  Functions   and  Bilinear  Maps

An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps

... MSSS scheme, the se- crets could be recovered in different ...MSSS scheme where the number of pub- lic values exclusively depends on the number of ...This scheme uses only one generating polynomial ... See full document

10

A new secured VoIP using hierarchical threshold 
		secret sharing

A new secured VoIP using hierarchical threshold secret sharing

... The data in VoIP networks is a packet switched and interactive network. The traditional Public Switch Telephone Network (PSTN) is circuit switched. The circuit switched network is secure one but the packet ... See full document

5

One Time Password Scheme Via Secret Sharing Techniques

One Time Password Scheme Via Secret Sharing Techniques

... Verifiable secret sharing (VSS) solves these problems by guaranteeing that even if the dealer is malicious and delivers corrupt shares to some participants or some participants present an invalid share, ... See full document

50

Secret Sharing Algorithm Implementation on Single to Multi Cloud

Secret Sharing Algorithm Implementation on Single to Multi Cloud

... reliability, enhanced collaboration, portability, unlimited storage but how secure is it after all? If the safety of data cannot be assured when it is stored in our private server how can we be sure of its ... See full document

6

VISUAL CRYPTOGRAPHY FOR COLOR IMAGES

VISUAL CRYPTOGRAPHY FOR COLOR IMAGES

... the secret image is divided and encoded into n shadow images called ...see secret image, sometime k-1 of shares can not reveal information about secret ... See full document

5

Show all 10000 documents...