Sciweavers

Share
5 search results - page 1 / 1
» Bucket Hashing and its Application to Fast Message Authentic...
Sort
View
CRYPTO
1995
Springer
140views Cryptology» more  CRYPTO 1995»
11 years 10 months ago
Bucket Hashing and its Application to Fast Message Authentication
We introduce a new technique for constructing a family of universal hash functions. At its center is a simple metaphor: to hash a string x, cast each of its words into a small numb...
Phillip Rogaway
FSE
1997
Springer
246views Cryptology» more  FSE 1997»
11 years 10 months ago
Fast Message Authentication Using Efficient Polynomial Evaluation
Abstract. Message authentication codes (MACs) using polynomial evaluation have the advantage of requiring a very short key even for very large messages. We describe a low complexit...
Valentine Afanassiev, Christian Gehrmann, Ben J. M...
MM
2003
ACM
132views Multimedia» more  MM 2003»
11 years 12 months ago
A flexible and scalable authentication scheme for JPEG2000 image codestreams
JPEG2000 is an emerging standard for still image compression and is becoming the solution of choice for many digital imaging fields and applications. An important aspect of JPEG2...
Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong ...
ICDE
2009
IEEE
177views Database» more  ICDE 2009»
12 years 8 months ago
Light-Weight, Runtime Verification of Query Sources
Modern database systems increasingly make use of networked storage. This storage can be in the form of SAN's or in the form of shared-nothing nodes in a cluster. One type of a...
Tingjian Ge, Stanley B. Zdonik
IJNSEC
2008
132views more  IJNSEC 2008»
11 years 6 months ago
Improved Security Mechanism for Mobile IPv6
Security is a critical design issue in Mobile IPv6 since adversaries can take advantage of its routing process and arbitrarily channelize the traffic to different destinations. Th...
Jing Li, Po Zhang, Srinivas Sampalli
books