Sciweavers

ISPEC
2009
Springer
13 years 11 months ago
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying...
ISPEC
2009
Springer
13 years 11 months ago
Analysing Protocol Implementations
Anders Moen Hagalisletto, Lars Strand, Wolfgang Le...
ISPEC
2009
Springer
13 years 11 months ago
Hash-Based Key Management Schemes for MPEG4-FGS
We propose two symmetric-key management schemes for the encryption of scalable compressed video content. The schemes are applicable to MPEG-4 Fine Grain Scalability video coding. O...
Mohamed Karroumi, Ayoub Massoudi
ISPEC
2009
Springer
13 years 11 months ago
On the Correctness of an Approach against Side-Channel Attacks
Abstract. Side-channel attacks are a very powerful cryptanalytic technique. Li and Gu [ProvSec’07] proposed an approach against side-channel attacks, which states that a symmetri...
Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang
ISPEC
2009
Springer
13 years 11 months ago
Strongly Unforgeable ID-Based Signatures without Random Oracles
In this paper, we construct a strongly unforgeable ID-based signature scheme without random oracles.4 The signature size of our scheme is smaller than that of other schemes based o...
Chifumi Sato, Takeshi Okamoto, Eiji Okamoto
ISPEC
2009
Springer
13 years 11 months ago
An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems
Ruishan Zhang, Xinyuan Wang, Xiaohui Yang, Ryan Fa...