Sciweavers

88 search results - page 8 / 18
» Cryptographic tamper evidence
Sort
View
IEEESP
2008
67views more  IEEESP 2008»
13 years 7 months ago
Cryptographic Test Correction
Abstract. Multiple choice questionnaires (mcqs) are a widely-used assessment procedure where examinees are asked to select one or more choices from a list. This invited talk1 explo...
Éric Levieil, David Naccache
ICIP
2010
IEEE
13 years 5 months ago
Detecting photo manipulation on signs and billboards
The manipulation of text on a sign or billboard is relatively easy to do in a way that is perceptually convincing. When text is on a planar surface and imaged under perspective pr...
Valentina Conotter, Giulia Boato, Hany Farid
ISW
2001
Springer
14 years 7 days ago
An Auditable Metering Scheme for Web Advertisement Applications
This paper proposes a cryptographic mechanism for metering the duration and/or the number of instances of running a data process. This mechanism has the following property: knowing...
Liqun Chen, Wenbo Mao
EUROCRYPT
2001
Springer
14 years 8 days ago
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems
Abstract. We show that finding an efficiently computable injective homomorphism from the XTR subgroup into the group of points over GF(p2 ) of a particular type of supersingular e...
Eric R. Verheul
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
14 years 2 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...