Sciweavers

517 search results - page 62 / 104
» Bit Encryption Is Complete
Sort
View
ACSAC
2008
IEEE
14 years 2 months ago
pwdArmor: Protecting Conventional Password-Based Authentications
pwdArmor is a framework for fortifying conventional password-based authentications. Many password protocols are performed within an encrypted tunnel (e.g., TLS) to prevent the exp...
Timothy W. van der Horst, Kent E. Seamons
PKC
2007
Springer
111views Cryptology» more  PKC 2007»
14 years 2 months ago
Optimistic Fair Exchange in a Multi-user Setting
: This paper addresses the security of optimistic fair exchange in a multi-user setting. While the security of public key encryption and public key signature schemes in a single-us...
Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
HICSS
2005
IEEE
161views Biometrics» more  HICSS 2005»
14 years 1 months ago
Data Assurance in a Conventional File Systems
The goal of this research is to find a mechanism to guarantee that a file stored in a conventional file system, on disk, has not been modified. Our proposal for achieving that goa...
Sasa Rudan, Aleksandra Kovacevic, Charles A. Milli...
SIGCOMM
1995
ACM
13 years 11 months ago
Protocol Implementation Using Integrated Layer Processing
Integrated Layer Processing (ILP) is an implementation concept which "permit[s] the implementor the option of performing all the [data] manipulation steps in one or two integ...
Torsten Braun, Christophe Diot
DAC
2005
ACM
13 years 10 months ago
A watermarking system for IP protection by a post layout incremental router
In this paper, we introduce a new watermarking system for IP protection on post-layout design phase. Firstly the copyright is encrypted by DES (Data Encryption Standard) and then ...
Tingyuan Nie, Tomoo Kisaka, Masahiko Toyonaga