Sciweavers

24529 search results - page 502 / 4906
» Computing on Authenticated Data
Sort
View
FOCS
2007
IEEE
15 years 11 months ago
Lower Bounds on Signatures From Symmetric Primitives
We show that every construction of one-time signature schemes from a random oracle achieves black-box security at most 2(1+o(1))q , where q is the total number of oracle queries a...
Boaz Barak, Mohammad Mahmoody-Ghidary
SOCA
2007
IEEE
15 years 11 months ago
Mobile Agent and Web Service Integration Security Architecture
Mobile agent technology and Web Service technology compensate each other and play very important roles in eservice applications. The mechanism of Web Services technology naturally...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
SIBGRAPI
2005
IEEE
15 years 10 months ago
Ridge-Based Fingerprint Matching Using Hough Transform
Despite the efficacy of minutia-based fingerprint matching techniques for good-quality images captured by optical sensors, minutia-based techniques do not often perform so well on...
Aparecido Nilceu Marana, Anil K. Jain
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
15 years 10 months ago
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer is...
Rachna Dhamija, J. D. Tygar
GRID
2004
Springer
15 years 10 months ago
MARS: A Metascheduler for Distributed Resources in Campus Grids
Computational grids are increasingly being deployed in campus environments to provide unified access to distributed and heterogeneous resources such as clusters, storage arrays, ...
Abhijit Bose, Brian Wickman, Cameron Wood