Abstract. A device that performs private key operations (signatures or decryptions), and whose private key operations are protected by a password, can be immunized against offline...
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
d Abstract) Robert M. Arlein Ben Jai Markus Jakobsson Fabian Monrose Michael K. Reiter Information Sciences Research Center Bell Labs, Lucent Technologies Murray Hill, NJ, USA We ...
Robert M. Arlein, Ben Jai, Markus Jakobsson, Fabia...
Abstract. There have been many proposals in recent years for passwordauthenticated key exchange protocols. Many of these have been shown to be insecure, and the only ones that seem...
Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan
Abstract. In recent years, there has been a surge of interest in Javabased volunteer computing systems, which aim to make it possible to build very large parallel computing network...