Sciweavers

948 search results - page 150 / 190
» Attacking cryptographic schemes based on
Sort
View
ICAIL
2005
ACM
14 years 1 months ago
Arguing about cases as practical reasoning
In this paper we apply a general account of practical reasoning to arguing about legal cases. In particular, we describe how the reasoning in one very well known property law case...
Katie Atkinson, Trevor J. M. Bench-Capon, Peter Mc...
ADHOCNOW
2005
Springer
14 years 1 months ago
Enhancing the Security of On-demand Routing in Ad Hoc Networks
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
ICMCS
2006
IEEE
116views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Robust Watermarking in the Wigner Domain
In this paper, a new watermarking scheme in the joint timefrequency domain is introduced. Wigner distribution is used to transform an image into the spatial-spectral domain. The p...
Mahmood Al-khassaweneh, Selin Aviyente
IJBC
2008
95views more  IJBC 2008»
13 years 8 months ago
Time Scaling of Chaotic Systems: Application to Secure Communications
The paper deals with time-scaling transformations of dynamical systems. Such scaling functions operate a change of coordinates on the time axis of the system trajectories preservi...
Donatello Materassi, Michele Basso
ICDE
2007
IEEE
151views Database» more  ICDE 2007»
14 years 9 months ago
Fast, Secure Encryption for Indexing in a Column-Oriented DBMS
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of encryption have been proposed to deal with this proble...
Tingjian Ge, Stanley B. Zdonik