Sciweavers

503 search results - page 36 / 101
» Authenticity by tagging and typing
Sort
View
ISPA
2005
Springer
14 years 2 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...
CRYPTO
2003
Springer
98views Cryptology» more  CRYPTO 2003»
14 years 2 months ago
A Message Authentication Code Based on Unimodular Matrix Groups
We present a new construction based on modular groups. A novel element of our construction is to embed each input into a sequence of matrices with determinant ±1, the product of w...
Matthew Cary, Ramarathnam Venkatesan
ISM
2006
IEEE
98views Multimedia» more  ISM 2006»
14 years 2 months ago
MeTaMaF: Metadata Tagging and Mapping Framework for Managing Multimedia Content
Metadata comes into forefront as a savior of multimedia search and management complexity. However, the existence of the diverse set of metadata standards and the different vocabul...
M. Anwar Hossain, Md. Anisur Rahman, Iluju Kiringa...
JOC
2008
97views more  JOC 2008»
13 years 8 months ago
Tag-KEM/DEM: A New Framework for Hybrid Encryption
This paper presents a novel framework for the generic construction of hybrid encryption schemes which produces more efficient schemes than the ones known before. A previous framew...
Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa
ACL
1998
13 years 10 months ago
Named Entity Scoring for Speech Input
This paper describes a new scoring algorithm that supports comparison of linguistically annotated data from noisy sources. The new algorithm generalizes the Message Understanding ...
John D. Burger, David D. Palmer, Lynette Hirschman