搜索结果: 1-15 共查到“军事学 visual”相关记录22条 . 查询时间(0.046 秒)
In this paper we consider both ``OR" and ``XOR" based monochrome random grid visual cryptographic schemes (RGVCS) for tt-(k,n)∗(k,n)∗ access structure which is a generalization of the thre...
Honey encryption (HE) is a new technique to overcome the weakness of conventional password-based encryption (PBE). However, conventional honey encryption still has the limitation that it works only fo...
Efficient Construction of Visual Cryptographic Scheme for Compartmented Access Structures
Compartmented access structure monotone access structure
2016/12/7
In this paper, we consider a special type of secret sharing scheme known as Visual Cryptographic
Scheme (VCS) in which the secret reconstruction is done visually without any
mathematical computation...
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
mobile security Mobile application spoofing
2015/12/24
Mobile application spoofing is an attack where a malicious mobile application mimics the visual appearance of another one. If such an attack is successful, the integrity of what the user sees as well ...
On the Relation of Random Grid, Probabilistic and Deterministic Visual Cryptography
secret sharing visual cryptography
2014/3/5
Visual cryptography is a special type of secret sharing. Two models of visual cryptography have been independently studied: deterministic visual cryptography, introduced by Naor and Shamir, and random...
In this paper we propose a novel method for performing secure two-party computation. By merging together in a suitable way two beautiful ideas of the 80's and the 90's, Yao's garbled circuit construct...
On the Security of a Cheating Immune Visual Secret Sharing Scheme
applications / Visual Cryptography Visual Secret Sharing Cheating
2012/6/14
Visual Secret Sharing (VSS), first invented by Naor and Shamir, is a variant of secret sharing. In the literature, VSS schemes have many applications, including visual authentication and identificatio...
On the Security of a Cheating Immune Visual Secret Sharing Scheme
applications / Visual Cryptography Visual Secret Sharing Cheating, Cheating Prevention Cheating Immune Scheme
2012/3/22
Visual Secret Sharing (VSS), first invented by Naor and Shamir, is a variant of secret sharing. In the literature, VSS schemes have many applications, including visual authentication and identificatio...
On the Security of a Cheating Immune Visual Secret Sharing Scheme
applications / Visual Cryptography Visual Secret Sharing Cheating Cheating Prevention Cheating Immune Scheme
2012/3/21
Visual Secret Sharing (VSS), first invented by Naor and Shamir, is a variant of secret sharing. In the literature, VSS schemes have many applications, including visual authentication and identificatio...
High-Entropy Visual Identification for Touch Screen Devices
applications visual cryptography user identification
2011/7/25
We exhibit a system for improving the quality of user-derived keying material on touch-screen devices. We allow a device to recover previously generated, highly entropic data suitable for use as (part...
Encrypting More Information in Visual Cryptography Scheme
Secret Sharing Visual Cryptography Covert data Sub-channel
2011/7/25
The visual cryptography scheme (VCS) is a scheme which encodes a secret image into several shares, and only qualified sets of shares can recover the secret image visually, other sets of shares cannot ...
High-Entropy Visual Identification for Touch Screen Devices
applications / visual cryptography user identification
2012/3/27
We exhibit a system for improving the quality of user-derived keying material on touch-screen devices. We allow a device to recover previously generated, highly entropic data suitable for use as (part...
Encrypting More Information in Visual Cryptography Scheme
secret-key cryptography / Visual Cryptography
2012/3/27
The visual cryptography scheme (VCS) is a scheme which encodes a secret image into several shares, and only qualified sets of shares can recover the secret image visually, other sets of shares cannot ...
Optimal XOR based (2,n)-Visual Cryptography Schemes
Secret sharing Visual cryptography scheme Coding theory
2010/11/2
A (2,n)-Visual Cryptography Scheme (VCS) is a kind of secret sharing scheme, where n participants share a secret image, and any two of them can recover the secret image visually without any cryptograp...
Embedded Extended Visual Cryptography Schemes
Secret sharing Embedded extended visual cryptography scheme
2010/8/17
Visual cryptography scheme (VCS) is a kind of secret sharing scheme which allows the encoding of a secret image into n shares that distributed to n participants. The beauty of such scheme is that a se...