Sciweavers

233 search results - page 17 / 47
» Data Encryption Using MRF with an RSA Key
Sort
View
USS
2010
14 years 9 months ago
Fighting Coercion Attacks in Key Generation using Skin Conductance
Many techniques have been proposed to generate keys including text passwords, graphical passwords, biometric data and etc. Most of these techniques are not resistant to coercion a...
Payas Gupta, Debin Gao
IDTRUST
2009
ACM
15 years 6 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper
ISPASS
2005
IEEE
15 years 5 months ago
Anatomy and Performance of SSL Processing
A wide spectrum of e-commerce (B2B/B2C), banking, financial trading and other business applications require the exchange of data to be highly secure. The Secure Sockets Layer (SSL...
Li Zhao, Ravi R. Iyer, Srihari Makineni, Laxmi N. ...
CN
2006
62views more  CN 2006»
14 years 11 months ago
Key bundles and parcels: Secure communication in many groups
We consider a system where each user is in one or more elementary groups. In this system, arbitrary groups of users can be specified using the operations of union, intersection, a...
Eunjin Jung, Alex X. Liu, Mohamed G. Gouda
CEC
2008
IEEE
15 years 6 months ago
Fast symmetric keys generation via mutual mirroring process
—This paper presents an eavesdropper-proof algorithm that is capable of fast generating symmetric (secret) keys. Instead of literally exchanging secret keys, both the sender and ...
Chun-Shun Tseng, Ya-Yun Jheng, Sih-Yin Shen, Jung-...