Sciweavers

648 search results - page 5 / 130
» Authenticated hash tables
Sort
View
ACISP
2007
Springer
14 years 2 months ago
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions
We present a new non-interactive message authentication protocol in manual channel model (NIMAP, for short) using the weakest assumption on the manual channel (i.e. assuming the st...
Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh...
ICMCS
2007
IEEE
203views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Attacking Some Perceptual Image Hash Algorithms
Perceptual hashing is an emerging solution for multimedia content authentication. Due to their robustness, such techniques might not work well when malicious attack is perceptuall...
Li Weng, Bart Preneel
ICDAR
2011
IEEE
12 years 8 months ago
Recognizing Characters with Severe Perspective Distortion Using Hash Tables and Perspective Invariants
—In this paper, we present a novel method to recognize characters with severe perspective distortion using hash tables and perspective invariants. The proposed algorithm consists...
Pan Pan, Yuanping Zhu, Jun Sun 0004, Satoshi Naoi
MOBIHOC
2007
ACM
14 years 8 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
ICPR
2004
IEEE
14 years 9 months ago
Rehashing for Bayesian Geometric Hashing
Geometric hashing is a model-based recognition technique based on matching of transformation-invariant object representations stored in a hash table. In the last decade a number o...
Ehud Rivlin, Ilya Blayvas, Michael Lifshits, Micha...