Sciweavers

648 search results - page 5 / 130
» Authenticated hash tables
Sort
View
89
Voted
ACISP
2007
Springer
15 years 3 months ago
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions
We present a new non-interactive message authentication protocol in manual channel model (NIMAP, for short) using the weakest assumption on the manual channel (i.e. assuming the st...
Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh...
77
Voted
ICMCS
2007
IEEE
203views Multimedia» more  ICMCS 2007»
15 years 3 months ago
Attacking Some Perceptual Image Hash Algorithms
Perceptual hashing is an emerging solution for multimedia content authentication. Due to their robustness, such techniques might not work well when malicious attack is perceptuall...
Li Weng, Bart Preneel
88
Voted
ICDAR
2011
IEEE
13 years 9 months ago
Recognizing Characters with Severe Perspective Distortion Using Hash Tables and Perspective Invariants
—In this paper, we present a novel method to recognize characters with severe perspective distortion using hash tables and perspective invariants. The proposed algorithm consists...
Pan Pan, Yuanping Zhu, Jun Sun 0004, Satoshi Naoi
98
Voted
MOBIHOC
2007
ACM
15 years 9 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
ICPR
2004
IEEE
15 years 10 months ago
Rehashing for Bayesian Geometric Hashing
Geometric hashing is a model-based recognition technique based on matching of transformation-invariant object representations stored in a hash table. In the last decade a number o...
Ehud Rivlin, Ilya Blayvas, Michael Lifshits, Micha...