Sciweavers

24529 search results - page 170 / 4906
» Computing on Authenticated Data
Sort
View
121
Voted
ESORICS
2006
Springer
15 years 6 months ago
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
Abstract We present a computational analysis of basic Kerberos with and without its public-key extension PKINIT in which we consider authentication and key secrecy properties. Our ...
Michael Backes, Iliano Cervesato, Aaron D. Jaggard...
ACSAC
2005
IEEE
15 years 8 months ago
mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients
Client-server applications often do not scale well when a large number of clients access a single server. To solve this, a new trend is to allow a client to download data from oth...
Jun Li, Xun Kang
CORR
2010
Springer
112views Education» more  CORR 2010»
15 years 3 months ago
Data security in mobile devices by geo locking
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and ...
M. Prabu Kumar, K. Praneesh Kumar Yadav
APCCAS
2006
IEEE
268views Hardware» more  APCCAS 2006»
15 years 9 months ago
A One-Dimensional Technique for Embedding Data in A JPEG Color Image
—A method of embedding data in a JPEG color image for applications such as authentication of an employee carrying a picture identification card is described. Embedding of data, s...
Kaliappan Gopalan
EDM
2008
92views Data Mining» more  EDM 2008»
15 years 4 months ago
Mining Free-form Spoken Responses to Tutor Prompts
How can an automated tutor assess children's spoken responses despite imperfect speech recognition? We address this challenge in the context of tutoring children in explicit s...
Xiaonang Zhang, Jack Mostow, Nell Duke, Christina ...