Sciweavers

3899 search results - page 14 / 780
» Robust Image Hashing
Sort
View
ACSAC
2009
IEEE
15 years 4 months ago
A Study of User-Friendly Hash Comparison Schemes
—Several security protocols require a human to compare two hash values to ensure successful completion. When the hash values are represented as long sequences of numbers, humans ...
Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassan...
101
Voted
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
15 years 4 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
FC
2004
Springer
120views Cryptology» more  FC 2004»
15 years 3 months ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
FODO
1993
Springer
147views Algorithms» more  FODO 1993»
15 years 1 months ago
Design and Implementation of DDH: A Distributed Dynamic Hashing Algorithm
Abstract. DDH extends the idea of dynamic hashing algorithms to distributed systems. DDH spreads data across multiple servers in a network using a novel autonomous location discove...
Robert Devine