Sciweavers

1825 search results - page 223 / 365
» Cryptographic Securities Exchanges
Sort
View
CANS
2008
Springer
126views Cryptology» more  CANS 2008»
15 years 6 months ago
A New Message Recognition Protocol for Ad Hoc Pervasive Networks
We propose a message recognition protocol which is suitable for ad hoc pervasive networks without the use of hash chains. Hence, we no longer require the devices to save values of ...
Atefeh Mashatan, Douglas R. Stinson
CCS
2008
ACM
15 years 6 months ago
Using rhythmic nonces for puzzle-based DoS resistance
To protect against replay attacks, many Internet protocols rely on nonces to guarantee freshness. In practice, the server generates these nonces during the initial handshake, but ...
Ellick Chan, Carl A. Gunter, Sonia Jahid, Evgeni P...
DRMTICS
2005
Springer
15 years 6 months ago
A Novel Framework for Multiple Creatorship Protection of Digital Movies
A digital movie can be created jointly under the cooperation of many creators. It is then necessary to provide protection to the creatorship of each participating creator. In this ...
Yu-Quan Zhang, Sabu Emmanuel
CSREASAM
2006
15 years 5 months ago
On Achieving Trustworthy SOA-Based Web Services
This work is inspired by the intend to construct SOABased E-Government. We first emphasize the importance of taking measures for solving security problems facing Web Services, we ...
Jianwu Zheng, Mingsheng Liu, Hui Liu
INFORMATICALT
2006
134views more  INFORMATICALT 2006»
15 years 4 months ago
Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem
We know the necessity for information security becomes more widespread in these days, especially for hardware-based implementations such as smart cards chips for wireless applicati...
Chia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, Te-Je...