The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose an EPON-based intranet system using newly developed ONU-embedded PCI cards. We confirm the practical feasibility of the system by clarifying the features and assessing the performance.
Recently, several scrambling techniques have been proposed for video digitally archived. These methods realize efficient processing by partial encryption on MPEG compressed data while keeping compatibility to MPEG format. However, they have common drawbacks expanding the entire code. Also, they have not reported on local shuffling in a frame. In this work, we propose a new video scrambling scheme...
This paper presents a graphical comparative study of steganographic methods in the DCT domain. This graphical representation allows at-one-glance comparison among steganographic methods, showing the relative performance of each method with respect to the ideal methods for the metrics considered. Six representative DCT-based steganographic methods are selected and fairly compared in terms of six significant...
This paper continues the study of password-based protocols for authenticated key exchange (AKE). In 2000, Bellare, Pointcheval, and Rogaway proposed the formal model on AKE. In this paper, we propose new security notions on AKE, based on the non-malleability of session keys. Then we prove that those security notion are equivalent. Furthermore, we show that there is a protocol secure in the random...
There is a signature scheme which can aggregate two or more persons' signatures to one, called an aggregate signature. In this paper, we propose a scheme of an aggregate signature which has additional functionality allowing any holder of a signature to designate the signature to any desired designated-verifier. By this functionality, no one other than the designated-verifier can verify the signature,...
A blocking method for the RSA cryptosystem is presented. It causes no expansion in block size by encipherment. The heart of the proposed method is the encryption function which involves two RSA encryptions interleaved with a domain interchanging function. This method enables easy adoption of the RSA cryptosystem to already established systems. Moreover, this method is a simple solution to the reblocking...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.