Sciweavers

2209 search results - page 326 / 442
» Language Based Secure Communication
Sort
View
135
Voted
MUE
2007
IEEE
104views Multimedia» more  MUE 2007»
15 years 9 months ago
A Conference Key Distribution Scheme Using Interpolating Polynomials
Conference keys are secret keys used by a group of users commonly and with which they can encipher (or decipher) messages such that communications are secure. Based on the Diffie ...
Chin-Chen Chang, Chu-Hsing Lin, Chien-Yuan Chen
92
Voted
GLOBECOM
2006
IEEE
15 years 9 months ago
Performance of End-to-End Mobility Management in Satellite IP Networks
— IETF has developed Mobile IP to support mobility of IP hosts at the network layer. The National Aeronautics and Space Administration has implemented Mobile IP to handle handove...
Pulak K. Chowdhury, Mohammed Atiquzzaman, William ...
137
Voted
ICICS
2005
Springer
15 years 8 months ago
Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream
Abstract. Multimedia community is moving from monolithic applications to more flexible and scalable integrated solutions. Stream authentication is more complex since a stream may ...
Tieyan Li, Huafei Zhu, Yongdong Wu
ISW
2005
Springer
15 years 8 months ago
Universally Composable Time-Stamping Schemes with Audit
Abstract. We present a universally composable time-stamping scheme based on universal one-way hash functions. The model we use contains an ideal auditing functionality (implementab...
Ahto Buldas, Peeter Laud, Märt Saarepera, Jan...
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
15 years 8 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli