Sciweavers

507 search results - page 30 / 102
» The XTR Public Key System
Sort
View
216
Voted

Lecture Notes
404views
16 years 10 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
133
Voted
EUROCRYPT
2010
Springer
15 years 5 months ago
Algebraic Cryptanalysis of McEliece Variants with Compact Keys
In this paper we propose a new approach to investigate the security of the McEliece cryptosystem. We recall that this cryposystem relies on the use of error-correcting codes. Since...
Jean-Charles Faugère, Ayoub Otmani, Ludovic...
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
15 years 4 months ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor
VTC
2008
IEEE
15 years 7 months ago
Secure Vehicular Communication for Safety Applications - A Measurement Study
Abstract—In this paper, we explore the feasibility of vehicleto-vehicle (V2V) secure communication using public key cryptography. We implement a prototype and test it extensively...
Juhong Min, Jihun Ha, Sangki Yun, Inhye Kang, Hyog...
TSD
2010
Springer
14 years 11 months ago
Online TV Captioning of Czech Parliamentary Sessions
Abstract. In the paper we introduce the on-line captioning system developed by our teams and used by the Czech Television (CTV), the public service broadcaster in the Czech Republi...
Jan Trmal, Ales Prazák, Zdenek Loose, Josef...