Sciweavers

112 search results - page 11 / 23
» Secure Bit-Plane Based Steganography for Secret Communicatio...
Sort
View
CIC
2006
114views Communications» more  CIC 2006»
14 years 11 months ago
Tree Based Conference Key Establishment Cost Analysis and Minimization in Heterogeneous Networks
A shared secret, conference key, must be established among members to securely communicate among them. The Diffie-Hellman is often used for the conference key establishment. In a ...
Zhan Liu, Mi Lu
ISCC
2009
IEEE
170views Communications» more  ISCC 2009»
15 years 4 months ago
A directly public verifiable signcryption scheme based on elliptic curves
A directly public verifiable signcryption scheme is introduced in this paper that provides the security attributes of message confidentiality, authentication, integrity, non-repud...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
SPLST
2003
14 years 10 months ago
Secure SMS messaging using Quasigroup encryption and Java SMS API
SMS (Short Message Service) is a widely used service for brief communication. Occasionally the data sent using SMS services is confidential in nature and is desired not to be disc...
Marko Hassinen, Smile Markovski
INFOCOM
2010
IEEE
14 years 8 months ago
Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks
—Neighbor discovery is a fundamental requirement and need be done frequently in underwater acoustic networks (UANs) with floating node mobility. In hostile environments, neighbo...
Rui Zhang, Yanchao Zhang
DAC
2009
ACM
14 years 7 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic