Sciweavers

24529 search results - page 344 / 4906
» Computing on Authenticated Data
Sort
View
PET
2007
Springer
15 years 10 months ago
Pairing-Based Onion Routing
Abstract. This paper presents a novel use of pairing-based cryptography to improve circuit construction in onion routing anonymity networks. Instead of iteratively and interactivel...
Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
ICMCS
2006
IEEE
131views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Wavelet-based Color Image Watermarking using Adaptive Entropy Casting
An adaptive robust image watermarking technique for color image authentication is proposed. In the proposed approach, the Y channel of a Yuv color host image and a concatenated RG...
Ming-Shing Hsieh, Din-Chang Tseng
SUTC
2006
IEEE
15 years 10 months ago
Securing Distributed Wireless Sensor Networks: Issues and Guidelines
With the emergence of ubiquitous computing the role of sensor network is becoming more important which demands highest level security and energy efficiency. In this paper we have ...
Riaz Ahmed Shaikh, Sungyoung Lee, Young Jae Song, ...
MM
2005
ACM
114views Multimedia» more  MM 2005»
15 years 9 months ago
IMAGINATION: a robust image-based CAPTCHA generation system
We propose IMAGINATION (IMAge Generation for INternet AuthenticaTION), a system for the generation of attack-resistant, user-friendly, image-based CAPTCHAs. In our system, we prod...
Ritendra Datta, Jia Li, James Ze Wang
CIS
2005
Springer
15 years 9 months ago
On the Security of Some Password-Based Key Agreement Schemes
In this paper we show that two potential security vulnerabilities exist in the strong password-only authenticated key exchange scheme due to Jablon. Two standardised schemes based...
Qiang Tang, Chris J. Mitchell