Sciweavers

1262 search results - page 24 / 253
» Fast Robust Hashing
Sort
View
79
Voted
CRYPTO
2008
Springer
100views Cryptology» more  CRYPTO 2008»
14 years 11 months ago
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Abstract. This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions. The attacks use a substantial number of verif...
Helena Handschuh, Bart Preneel
ICMCS
2010
IEEE
165views Multimedia» more  ICMCS 2010»
14 years 10 months ago
On deriving longer fingerprints from features based on projections
We propose three methods to derive longer fingerprints from features using projection based hashing methods. For this class of hashing methods, a feature matrix is projected onto ...
Regunathan Radhakrishnan, Claus Bauer, Wenyu Jiang
105
Voted
MEDIAFORENSICS
2010
14 years 11 months ago
Forensic hash for multimedia information
Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social netw...
Wenjun Lu, Avinash L. Varna, Min Wu
84
Voted
CCR
2004
113views more  CCR 2004»
14 years 9 months ago
Implementing aggregation and broadcast over Distributed Hash Tables
Peer-to-peer (P2P) networks represent an effective way to share information, since there are no central points of failure or bottleneck. However, the flip side to the distributive...
Ji Li, Karen R. Sollins, Dah-Yoh Lim
73
Voted
ICC
2007
IEEE
105views Communications» more  ICC 2007»
15 years 3 months ago
Wheel of Trust: A Secure Framework for Overlay-Based Services
— The recent advances of distributed hash tables (DHTs) facilitate the development of highly scalable and robust network applications and services. However, with applications and...
Guor-Huar Lu, Zhi-Li Zhang