Sciweavers

1190 search results - page 24 / 238
» Secure off-the-record messaging
Sort
View
82
Voted
ICMCS
2007
IEEE
125views Multimedia» more  ICMCS 2007»
15 years 8 months ago
JPEG Based Conditional Entropy Coding for Correlated Steganography
Correlated steganography considers the case in which the cover Work is chosen to be correlated with the covert message that is to be hidden. The advantage of this is that, at leas...
Lei Zheng, Ingemar J. Cox
115
Voted
SERVICES
2008
71views more  SERVICES 2008»
15 years 3 months ago
Identifying Opportunities for Web Services Security Performance Optimizations
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties, thereby assuring the participation of nonsecure tran...
Robert A. van Engelen, Wei Zhang
GLOBECOM
2007
IEEE
15 years 8 months ago
A Secure Data Transmission Scheme for Mobile Ad Hoc Networks
— We propose a secure data transmission scheme that takes advantage of node mobility. The scheme is based on the observation that due to mobility, messages sent at different time...
Qunwei Zheng, Xiaoyan Hong, Jun Liu, Lei Tang
PET
2007
Springer
15 years 8 months ago
Two-Sided Statistical Disclosure Attack
We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, that tries to uncover the receivers of messages sent through an anonymizing network support...
George Danezis, Claudia Díaz, Carmela Tronc...
CIS
2004
Springer
15 years 7 months ago
General Public Key m-Out-of-n Oblivious Transfer
Abstract. In the m-out-of-n oblivious transfer model, Alice has n messages, Bob has m choices. After the interaction between the two parties, Bob can get m but only m messages from...
Zhide Chen, Hong Zhu