Sciweavers

620 search results - page 29 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
ISMIR
2005
Springer
156views Music» more  ISMIR 2005»
15 years 3 months ago
The 2005 Music Information retrieval Evaluation Exchange (MIREX 2005): Preliminary Overview
er is an extended abstract which provides a brief preliminary overview of the 2005 Music Information Retrieval Evaluation eXchange (MIREX 2005). The MIREX organizational framework...
J. Stephen Downie, Kris West, Andreas F. Ehmann, E...
SPW
2004
Springer
15 years 3 months ago
BLIND: A Complete Identity Protection Framework for End-Points
In this paper, we present a security framework that provides identity protection against active and passive attacks for end-points. The framework is based on a two-round-trip authe...
Jukka Ylitalo, Pekka Nikander
CEC
2008
IEEE
15 years 4 months ago
Fast symmetric keys generation via mutual mirroring process
—This paper presents an eavesdropper-proof algorithm that is capable of fast generating symmetric (secret) keys. Instead of literally exchanging secret keys, both the sender and ...
Chun-Shun Tseng, Ya-Yun Jheng, Sih-Yin Shen, Jung-...
AAECC
2006
Springer
132views Algorithms» more  AAECC 2006»
14 years 10 months ago
The Conjugacy Search Problem in Public Key Cryptography: Unnecessary and Insufficient
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. This problem is in the core of several recently suggested public key ...
Vladimir Shpilrain, Alexander Ushakov
EUROCRYPT
2004
Springer
15 years 3 months ago
Public-Key Steganography
Informally, a public-key steganography protocol allows two parties, who have never met or exchanged a secret, to send hidden messages over a public channel so that an adversary can...
Luis von Ahn, Nicholas J. Hopper