Sciweavers

1190 search results - page 162 / 238
» Secure off-the-record messaging
Sort
View
102
Voted
ISCAS
2006
IEEE
155views Hardware» more  ISCAS 2006»
15 years 6 months ago
Design and evaluation of steganography for voice-over-IP
—According to former results from [1] in this paper we summarize the design principles from the general approach and introduce extended experimental test results of a Voice-over-...
Christian Krätzer, Jana Dittmann, Thomas Voge...
81
Voted
ISI
2004
Springer
15 years 6 months ago
Identifying Multi-ID Users in Open Forums
We describe a model for real-time communication exchange in public forums, such as newsgroups and chatrooms, and use this model to develop an efficient algorithm which identifies...
Hung-Ching Chen, Mark K. Goldberg, Malik Magdon-Is...
85
Voted
EUROCRYPT
1999
Springer
15 years 5 months ago
Lower Bounds for Oblivious Transfer Reductions
We prove the first general and non-trivial lower bound for the number of times a 1-out-of-n Oblivious Transfer of strings of length should be invoked so as to obtain, by an inform...
Yevgeniy Dodis, Silvio Micali
AC
1997
Springer
15 years 4 months ago
Cryptographic Primitives for Information Authentication - State of the Art
This paper describes the state of the art for cryptographic primitives that are used for protecting the authenticity of information: cryptographic hash functions and digital signat...
Bart Preneel
84
Voted
ICICS
1997
Springer
15 years 4 months ago
Stateless connections
We describe a secure transformation of stateful connections or parts of them into stateless ones by attaching the state information to the messages. Secret-key cryptography is used...
Tuomas Aura, Pekka Nikander