Sciweavers

16 search results - page 1 / 4
» Password Authentication Schemes: Current Status and Key Issu...
Sort
View
IJNSEC
2006
143views more  IJNSEC 2006»
13 years 4 months ago
Password Authentication Schemes: Current Status and Key Issues
Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in...
Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang
IJNSEC
2006
200views more  IJNSEC 2006»
13 years 4 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
IJNSEC
2007
161views more  IJNSEC 2007»
13 years 4 months ago
Data Hiding: Current Status and Key Issues
Image steganography is a covert communication method that uses an image as the cover to hide the truth from potential attackers that some secret message hidden in the image is bei...
Nan-I Wu, Min-Shiang Hwang
IJNSEC
2006
115views more  IJNSEC 2006»
13 years 4 months ago
Reversible Watermarking: Current Status and Key Issues
Over the past few years a number of research papers about reversible watermarks has been produced. Reversible watermarking is a novel category of watermarking schemes. It not only...
Jen-Bang Feng, Iuon-Chang Lin, Chwei-Shyong Tsai, ...
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
13 years 10 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay