Sciweavers

234 search results - page 8 / 47
» Security Aspects of the Authentication Used in Quantum Crypt...
Sort
View
ESCIENCE
2005
IEEE
15 years 3 months ago
Identity-Based Cryptography for Grid Security
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Hoon Wei Lim, Kenneth G. Paterson
CORR
2010
Springer
128views Education» more  CORR 2010»
14 years 9 months ago
Random Oracles in a Quantum World
Once quantum computers reach maturity most of today's traditional cryptographic schemes based on RSA or discrete logarithms become vulnerable to quantum-based attacks. Hence, ...
Özgür Dagdelen, Marc Fischlin, Anja Lehm...
SIBGRAPI
2003
IEEE
15 years 2 months ago
Secure Authentication Watermarking for Binary Images
Abstract. Authentication watermarking is a hidden data inserted into an image, in order to detect any alterations. It seems to be almost impossible to design a really secure authen...
Hae Yong Kim, Amir Afif
ACNS
2008
Springer
172views Cryptology» more  ACNS 2008»
15 years 4 months ago
Traceable Privacy of Recent Provably-Secure RFID Protocols
Abstract. One of the main challenges in RFIDs is the design of privacypreserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authen...
Khaled Ouafi, Raphael C.-W. Phan
CORR
2010
Springer
99views Education» more  CORR 2010»
14 years 9 months ago
INDECT Advanced Security Requirements
This paper reviews the requirements for the security mechanisms that are currently being developed in the framework of the European research project INDECT. An overview of features...
Manuel Urueña, Petr Machnik, Maria Martinez...