Sciweavers

4438 search results - page 54 / 888
» On the Distribution of Keys by Hashing
Sort
View
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
15 years 8 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee
CRYPTO
2009
Springer
119views Cryptology» more  CRYPTO 2009»
15 years 6 months ago
How Risky Is the Random-Oracle Model?
RSA-FDH and many other schemes secure in the Random-Oracle Model (ROM) require a hash function with output size larger than standard sizes. We show that the random-oracle instanti...
Gaëtan Leurent, Phong Q. Nguyen
GLOBECOM
2006
IEEE
15 years 5 months ago
Fast Robust Hashing
Abstract— As stateful flow-aware services are becoming commonplace, distributed router architectures have to quickly assign packets being forwarded to service-specialized proces...
Manuel Urueña, David Larrabeiti, Pablo Serr...
ICIP
2008
IEEE
16 years 1 months ago
Localization of sparse image tampering via random projections
Hashes can be used to provide authentication of multimedia contents. In the case of images, a hash can be used to detect whether the data has been modified in an illegitimate way....
Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tu...