Sciweavers

1190 search results - page 125 / 238
» Secure off-the-record messaging
Sort
View
IJNSEC
2007
144views more  IJNSEC 2007»
15 years 22 days ago
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Magdy Saeb, Meer Hamza, Ahmed El-Shikh
108
Voted
IH
1998
Springer
15 years 5 months ago
Steganography in a Video Conferencing System
We describe a steganographic system which embeds secret messages into a video stream. We examine the signal path which typically includes discrete cosine transformation (DCT) based...
Andreas Westfeld, Gritta Wolf
101
Voted
AMC
2005
121views more  AMC 2005»
15 years 22 days ago
A new key authentication scheme for cryptosystems based on discrete logarithms
Key authentication is very important in private communication and data integrity. Recently, Peinado, Zhang and Kim showed that the LHL scheme is not secure, respectively. From pub...
Zuhua Shao
101
Voted
IJNSEC
2008
98views more  IJNSEC 2008»
15 years 25 days ago
An Update on the Analysis and Design of NMAC and HMAC Functions
In this paper, we investigate the issues in the analysis and design of provably secure message authentication codes (MACs) Nested MAC (NMAC) and Hash based MAC (HMAC) proposed by ...
Praveen Gauravaram, Shoichi Hirose, Suganya Annadu...
ASIACRYPT
2009
Springer
15 years 7 months ago
Cascade Encryption Revisited
Abstract. The security of cascade blockcipher encryption is an important and well-studied problem in theoretical cryptography with practical implications. It is well-known that dou...
Peter Gazi, Ueli M. Maurer