Sciweavers

1825 search results - page 146 / 365
» Cryptographic Securities Exchanges
Sort
View
ASIACRYPT
2009
Springer
15 years 10 months ago
Secure Two-Party Computation Is Practical
Abstract. Secure multi-party computation has been considered by the cryptographic community for a number of years. Until recently it has been a purely theoretical area, with few im...
Benny Pinkas, Thomas Schneider, Nigel P. Smart, St...
RTA
2009
Springer
15 years 10 months ago
Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions
Abstract. We consider the problem of deciding the security of cryptographic protocols for a bounded number of sessions, taking into account some algebraic properties of the securit...
Sergiu Bursuc, Hubert Comon-Lundh
GLVLSI
2007
IEEE
162views VLSI» more  GLVLSI 2007»
15 years 10 months ago
Design of an UHF RFID transponder for secure authentication
RFID technology increases rapidly its applicability in new areas of interest without guaranteeing security and privacy issues. This paper presents a new architecture of an RFID tr...
Paolo Bernardi, Filippo Gandino, Bartolomeo Montru...
CTRSA
2003
Springer
105views Cryptology» more  CTRSA 2003»
15 years 9 months ago
Forward-Security in Private-Key Cryptography
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by...
Mihir Bellare, Bennet S. Yee
IEEEMSP
2002
IEEE
156views Multimedia» more  IEEEMSP 2002»
15 years 9 months ago
A robust and secure media signature scheme for JPEG images
—In [1, 2, 3], we have introduced a robust and secure digital signature solution for multimedia content authentication, by integrating content feature extraction, error correctio...
Qibin Sun, Qi Tian, Shih-Fu Chang