Sciweavers

76 search results - page 2 / 16
» Certification and Authentication of Data Structures
Sort
View
DCC
2005
IEEE
14 years 9 months ago
A Point-Set Compression Heuristic for Fiber-Based Certificates of Authenticity
A certificate of authenticity (COA) is an inexpensive physical object that has a random unique structure with high cost of near-exact reproduction. An additional requirement is th...
Darko Kirovski
AMC
2005
218views more  AMC 2005»
13 years 9 months ago
Cryptanalysis of Lee-Hwang-Li's key authentication scheme
Abstract. Key authentication is very important in secret communications and data security. Recently, Lee, Hwang and Li proposed a new public key authentication scheme for cryptosys...
Fangguo Zhang, Kwangjo Kim
CSREASAM
2006
13 years 11 months ago
Architectural Framework Design for Authentication Mechanism in Mobile Adhoc Networks (MANETs)
Wireless ad-hoc networks do not rely on a pre-existing network structure and are characterized by dynamic changes in the topology. This characteristic makes it difficult to perform...
Rajasekhar Yakkali, Gregory Vert
TIFS
2008
145views more  TIFS 2008»
13 years 9 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
FC
2005
Springer
149views Cryptology» more  FC 2005»
14 years 3 months ago
Ciphire Mail Email Encryption and Authentication
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Lars Eilebrecht