Sciweavers

948 search results - page 24 / 190
» Attacking cryptographic schemes based on
Sort
View
ESORICS
2005
Springer
14 years 1 months ago
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
Security protocols are critical for protecting modern communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these proto...
Aslan Askarov, Andrei Sabelfeld
IH
1998
Springer
14 years 4 days ago
Attacks on Copyright Marking Systems
In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects....
Fabien A. P. Petitcolas, Ross J. Anderson, Markus ...
GI
2005
Springer
14 years 1 months ago
Security Extensions to MMARP Through Cryptographically Generated Addresses
: The MMARP protocol provides multicast routing in hybrid environments in which an ad hoc network is connected to the Internet. As many other routing protocols it was initially des...
Francisco J. Galera, Pedro M. Ruiz, Antonio F. G&o...
WIMOB
2008
IEEE
14 years 2 months ago
Securing Dynamic Home Agent Address Discovery with Cryptographically Generated Addresses and RSA Signatures
With Dynamic Home Agent Address Discovery (DHAAD), as specified in Mobile IPv6, a Mobile Node can discover the address of a suitable Home Agent on the home link. However, DHAAD suf...
Christian Bauer, Max Ehammer
INFOCOM
2008
IEEE
14 years 2 months ago
An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks
Zhen Yu, Yawen Wei, Bhuvaneswari Ramkumar, Yong Gu...