Sciweavers

24529 search results - page 7 / 4906
» Computing on Authenticated Data
Sort
View
CANS
2006
Springer
114views Cryptology» more  CANS 2006»
14 years 9 days ago
Achieving Multicast Stream Authentication Using MDS Codes
We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network m...
Christophe Tartary, Huaxiong Wang
GI
2008
Springer
13 years 9 months ago
Authenticity: The missing link in the social semantic web
Abstract: Especially data on social network services (SNS) is linked to online personas. Our analysis has shown that no reliably solution for origin authentication is in widespread...
Bastian Braun, Henrich Christopher Pöhls
FTDCS
2003
IEEE
14 years 1 months ago
Adopting Redundancy Techniques for Multicast Stream Authentication
Various schemes have been proposed to achieve strong authenticationof streamed data in a lossy network by means of “light” digital signatures. Such techniques perform a strong...
Tommaso Cucinotta, Gabriele Cecchetti, Gianluca Fe...
ACL
2003
13 years 10 months ago
TotalRecall: A Bilingual Concordance for Computer Assisted Translation and Language Learning
This paper describes a Web-based English-Chinese concordance system, TotalRecall, developed to promote translation reuse and encourage authentic and idiomatic use in second langua...
Jian-Cheng Wu, Kevin C. Yeh, Thomas C. Chuang, Wen...
BIOSIG
2010
136views Biometrics» more  BIOSIG 2010»
13 years 6 months ago
User Survey on Phone Security and Usage
Abstract: Mobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a ...
Frank Breitinger, Claudia Nickel