Sciweavers

109 search results - page 17 / 22
» Some Attacks on the Bit-Search Generator
Sort
View
CEAS
2007
Springer
15 years 3 months ago
Hardening Fingerprinting by Context
Near-duplicate detection is not only an important pre and post processing task in Information Retrieval but also an effective spam-detection technique. Among different approache...
Aleksander Kolcz, Abdur Chowdhury
ESORICS
2008
Springer
14 years 11 months ago
Improved Security Notions and Protocols for Non-transferable Identification
Abstract. Different security notions and settings for identification protocols have been proposed so far, considering different powerful adversaries that can play "man-in-the-...
Carlo Blundo, Giuseppe Persiano, Ahmad-Reza Sadegh...
76
Voted
FOSAD
2005
Springer
15 years 3 months ago
Formal Methods for Smartcard Security
Smartcards are trusted personal devices designed to store and process confidential data, and to act as secure tokens for providing access to applications and services. Smartcards ...
Gilles Barthe, Guillaume Dufay
ICICS
2005
Springer
15 years 3 months ago
Security Properties of Two Authenticated Conference Key Agreement Protocols
In this paper we analyse the security of two authenticated group key agreement schemes based on the group key agreement protocol of Burmester and Desmedt. One scheme was proposed ...
Qiang Tang, Chris J. Mitchell
IWANN
2005
Springer
15 years 3 months ago
Robust Blind Image Watermarking with Independent Component Analysis: A Embedding Algorithm
Abstract. The authors propose a new solution to the blind robust watermarking of digital images. In this approach we embed the watermark into the independent components of the imag...
Juan José Murillo-Fuentes, Rafael Boloix-To...