Sciweavers

1161 search results - page 29 / 233
» Group Message Authentication
Sort
View
75
Voted
ISI
2006
Springer
14 years 9 months ago
Visualizing Authorship for Identification
As a result of growing misuse of online anonymity, researchers have begun to create visualization tools to facilitate greater user accountability in online communities. In this stu...
Ahmed Abbasi, Hsinchun Chen
AAAIDEA
2005
IEEE
15 years 3 months ago
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
Voice over IP (VoIP) and Instant Messaging (IM) systems to date have either followed a client-server model or have required the use of clients that do not follow any VoIP or IM st...
David A. Bryan, Bruce Lowekamp, Cullen Jennings
73
Voted
JSAC
2010
170views more  JSAC 2010»
14 years 4 months ago
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
Jamming-resistant communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. I...
Christina Pöpper, Mario Strasser, Srdjan Capk...
77
Voted
IJNSEC
2008
143views more  IJNSEC 2008»
14 years 9 months ago
New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme
In 2005, Lee, Kim, and Yoo proposed a nonce-based mutual authentication scheme using smart cards. However, this paper demonstrates that Lee-Kim-Yoo's scheme is vulnerable to ...
Da-Zhi Sun, Zhen-Fu Cao
98
Voted
ASIACRYPT
2003
Springer
15 years 1 months ago
Efficient Group Signatures without Trapdoors
Abstract. Group signature schemes are fundamental cryptographic tools that enable unlinkably anonymous authentication, in the same fashion that digital signatures provide the basis...
Giuseppe Ateniese, Breno de Medeiros