Sciweavers

981 search results - page 27 / 197
» Advanced Encryption Standard
Sort
View
ISM
2005
IEEE
109views Multimedia» more  ISM 2005»
14 years 4 months ago
Advances in X3D multi-user virtual environments
This paper presents the current state of the art in web3d multi-user technologies and more specifically networked virtual environment platforms that support the X3D standard, whic...
Christos Bouras, Alexandros Panagopoulos, Thrasyvo...
ISM
2006
IEEE
111views Multimedia» more  ISM 2006»
14 years 5 months ago
Compressed-Domain Encryption of Adapted H.264 Video
Commercial service providers and secret services yearn to employ the available environment for conveyance of their data in a secured way. In order to encrypt or to ensure personal...
Razib Iqbal, Shervin Shirmohammadi, Abdulmotaleb E...
CCS
2008
ACM
14 years 28 days ago
Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard
The Unified Model (UM) key agreement protocol is an efficient Diffie-Hellman scheme that has been included in many cryptographic standards, most recently in the NIST SP 80056A sta...
Alfred Menezes, Berkant Ustaoglu
CCS
2009
ACM
14 years 5 months ago
Anonymous credentials on a standard java card
Secure identity tokens such as Electronic Identity (eID) cards are emerging everywhere. At the same time usercentric identity management gains acceptance. Anonymous credential sch...
Patrik Bichsel, Jan Camenisch, Thomas Groß, ...
CL
1999
Springer
13 years 10 months ago
Compositional Petri net models of advanced tasking in Ada-95
Abstract The Ada language has been designed to support development of concurrent and distributed software. While the Ada83 standard defined the basic mechanisms of rendezvous-based...
Ravi K. Gedela, Sol M. Shatz, Haiping Xu