Sciweavers

24529 search results - page 137 / 4906
» Computing on Authenticated Data
Sort
View
126
Voted
ICMCS
2006
IEEE
178views Multimedia» more  ICMCS 2006»
15 years 8 months ago
Block-Based Lossless Data Hiding in Delta Domain
Digital watermarking is one of the ways to prove the ownership and the authenticity of the media. However, some applications, such as medical and military, are sensitive to distor...
Shu-Kei Yip, Oscar C. Au, Hoi-Ming Wong, Chi-Wang ...
104
Voted
FC
2009
Springer
109views Cryptology» more  FC 2009»
15 years 9 months ago
Optimised to Fail: Card Readers for Online Banking
Abstract. The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used toge...
Saar Drimer, Steven J. Murdoch, Ross J. Anderson
EJWCN
2010
118views more  EJWCN 2010»
14 years 9 months ago
Controlled Delegation Protocol in Mobile RFID Networks
To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is t...
Ming-Hour Yang
115
Voted
ICDCSW
2005
IEEE
15 years 8 months ago
Defending against Sybil Attacks in Sensor Networks
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certifi...
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng N...
SC
2005
ACM
15 years 8 months ago
Identity Boxing: A New Technique for Consistent Global Identity
Today, users of the grid may easily authenticate themselves to computing resources around the world using a public key security infrastructure. However, users are forced to employ...
Douglas Thain