Sciweavers

468 search results - page 85 / 94
» A Certified Digital Signature
Sort
View
SOCO
2008
Springer
13 years 10 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot
TIFS
2008
145views more  TIFS 2008»
13 years 10 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
CORR
2004
Springer
107views Education» more  CORR 2004»
13 years 10 months ago
Security of public key cryptosystems based on Chebyshev Polynomials
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptogra...
Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Lju...
CORR
2010
Springer
65views Education» more  CORR 2010»
13 years 10 months ago
Iterative method for improvement of coding and decryption
Cryptographic check values (digital signatures, MACs and H-MACs) are useful only if they are free of errors. For that reason all of errors in cryptographic check values should be ...
Natasa Zivic
ICASSP
2010
IEEE
13 years 9 months ago
CBCD based on color features and landmark MDS-assisted distance estimation
Content-Based Copy Detection (CBCD) of digital videos is an important research field that aims at the identification of modified copies of an original clip, e.g., on the Intern...
Marzia Corvaglia, Fabrizio Guerrini, Riccardo Leon...