Sciweavers

1161 search results - page 178 / 233
» Group Message Authentication
Sort
View
ICMCS
2008
IEEE
174views Multimedia» more  ICMCS 2008»
15 years 6 months ago
The Vera am Mittag German audio-visual emotional speech database
The lack of publicly available annotated databases is one of the major barriers to research advances on emotional information processing. In this contribution we present a recentl...
Michael Grimm, Kristian Kroschel, Shrikanth Naraya...
EUROMICRO
2007
IEEE
15 years 6 months ago
A Light-Weight Implementation Scheme of the Tree Morphing Protocol for Mobile Multicast Sources
Multicast network services advantageously complement multimedia information and communication technologies, as they open up the realm for highly scalable multicustomer application...
Olaf Christ, Thomas C. Schmidt, Matthias Wähl...
CRYPTO
2007
Springer
132views Cryptology» more  CRYPTO 2007»
15 years 6 months ago
Secure Hybrid Encryption from Weakened Key Encapsulation
We put forward a new paradigm for building hybrid encryption schemes from constrained chosen-ciphertext secure (CCCA) key-encapsulation mechanisms (KEMs) plus authenticated symmet...
Dennis Hofheinz, Eike Kiltz
SISW
2005
IEEE
15 years 5 months ago
The Consequences of Decentralized Security in a Cooperative Storage System
Traditional storage systems have considered security as a problem to be solved at the perimeter: once a user is authenticated, each device internal to the system trusts the decisi...
Douglas Thain, Christopher Moretti, Paul Madrid, P...
ICNP
2003
IEEE
15 years 5 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi