Sciweavers

648 search results - page 74 / 130
» Authenticated hash tables
Sort
View
INDOCRYPT
2004
Springer
15 years 10 months ago
The Security and Performance of the Galois/Counter Mode (GCM) of Operation
Abstract. The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing based on mul...
David A. McGrew, John Viega
PDCN
2007
15 years 6 months ago
Modified collision packet classification using counting bloom filter in tuple space
Packet classification continues to be an important challenge in network processing. It requires matching each packet against a database of rules and forwarding the packet accordi...
Mahmood Ahmadi, Stephan Wong
CN
2007
144views more  CN 2007»
15 years 5 months ago
SPP: An anti-phishing single password protocol
Most users have multiple accounts on the Internet where each account is protected by a password. To avoid the headache in remembering and managing a long list of different and un...
Mohamed G. Gouda, Alex X. Liu, Lok M. Leung, Moham...
ICMCS
2007
IEEE
163views Multimedia» more  ICMCS 2007»
15 years 11 months ago
Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact
Digital images can be forged easily with today’s widely available image processing software. In this paper, we describe a passive approach to detect digital forgeries by checkin...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
ACSAC
2009
IEEE
16 years 5 days ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans