ICICS
13 years 11 months ago
2004 Springer
Abstract. One of the central lines of cryptographic research is identifying the weakest assumptions required for the construction of secure primitives. In the context of group sign...
ICICS
13 years 11 months ago
2004 Springer
Abstract. Recently, there is an increase in the number of group communication applications which support multiple service groups of different access privileges. Traditional access...
ICICS
13 years 11 months ago
2004 Springer
Fail-stop signature (FSS) schemes are important primitives because in a fail-stop signature scheme the signer is protected against unlimited powerful adversaries as follows: Even i...
ICICS
13 years 11 months ago
2004 Springer
A mobile ad hoc network (MANET) is formed by a group of mobile wireless nodes, each of which functions as a router and agrees to forward packets for others. Many routing protocols ...
ICICS
13 years 11 months ago
2004 Springer
We present a scheme to steganographically embed information in x86 program binaries. We define sets of functionally-equivalent instructions, and use a key-derived selection proces...
|