Sciweavers

2601 search results - page 252 / 521
» Secure Rewarding Schemes
Sort
View
148
Voted
CRYPTOLOGIA
2006
155views more  CRYPTOLOGIA 2006»
15 years 3 months ago
The Whirlpool Secure Hash Function
In this paper, we describe Whirlpool, which is a block-cipher-based secure hash function. Whirlpool produces a hash code of 512 bits for an input message of maximum length less tha...
William Stallings
148
Voted
IJNSEC
2007
123views more  IJNSEC 2007»
15 years 3 months ago
Secure Error Signalling for Packet-Switched Networks - The Future Core Networks System Error Protocol
In this paper a secure error-signalling scheme for packetswitched network architectures is presented. Current solutions are based on the Internet Control Message Protocol to deliv...
Theodore Stergiou, Dimitrios L. Delivasilis
COMCOM
1999
73views more  COMCOM 1999»
15 years 3 months ago
Securing digital signatures for non-repudiation
Dispute of transactions is a common problem that could jeopardise business. Hence non-repudiation services are essential in business transactions which provide evidence to enable ...
Jianying Zhou, Kwok-Yan Lam
TIT
2010
133views Education» more  TIT 2010»
14 years 10 months ago
Secure transmission with multiple antennas I: the MISOME wiretap channel
Abstract--The role of multiple antennas for secure communication is investigated within the framework of Wyner's wiretap channel. We characterize the secrecy capacity in terms...
Ashish Khisti, Gregory W. Wornell
118
Voted
ICICS
2009
Springer
15 years 10 months ago
Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes
Abstract. We propose an efficient technique for the detection of errors in cryptographic circuits introduced by strong adversaries. Previously a number of linear and nonlinear err...
Zhen Wang, Mark G. Karpovsky, Berk Sunar, Ajay Jos...