Sciweavers

138 search results - page 18 / 28
» A Proposal of Short Proxy Signature using Pairing
Sort
View
SSWMC
2004
13 years 8 months ago
New attacks on SARI image authentication system
The image authentication system SARI proposed by Lin and Chang passes JPEG compression and rejects other malicious manipulations. Some vulnerabilities of the system have been repo...
Jinhai Wu, Bin B. Zhu, Shipeng Li, Fuzong Lin
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
13 years 10 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
NECO
2008
116views more  NECO 2008»
13 years 6 months ago
A (Somewhat) New Solution to the Variable Binding Problem
To perform automatic, unconscious inference, the human brain must solve the "binding problem" by correctly grouping properties with objects. Temporal binding models like...
Leon Barrett, Jerome Feldman, Liam Mac Dermed
ADHOCNOW
2007
Springer
14 years 28 days ago
Topology Control and Geographic Routing in Realistic Wireless Networks
We present a distributed topology control protocol that runs on a d-QUDG for d ≥ 1/ √ 2, and computes a sparse, constant-spanner, both in Euclidean distance and in hop distance...
Kevin M. Lillis, Sriram V. Pemmaraju, Imran A. Pir...
ACSAC
2009
IEEE
14 years 1 months ago
Online Sketching of Network Flows for Real-Time Stepping-Stone Detection
Abstract—We present an efficient and robust stepping-stone detection scheme based on succinct packet-timing sketches of network flows. The proposed scheme employs an online alg...
Baris Coskun, Nasir D. Memon