Sciweavers

502 search results - page 5 / 101
» Deploying a New Hash Algorithm
Sort
View
MYCRYPT
2005
Springer
248views Cryptology» more  MYCRYPT 2005»
14 years 27 days ago
A Family of Fast Syndrome Based Cryptographic Hash Functions
Recently, some collisions have been exposed for a variety of cryptographic hash functions [20,21] including some of the most widely used today. Many other hash functions using simi...
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
KBSE
2005
IEEE
14 years 1 months ago
Secure sharing between untrusted users in a transparent source/binary deployment model
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
Eelco Dolstra
ICAPR
2005
Springer
14 years 28 days ago
Symmetric Hash Functions for Fingerprint Minutiae
Abstract. The possibility that a database with biometric data is compromised is one of the main concerns in implementing biometric identification systems. In this paper we present...
Sergey Tulyakov, Faisal Farooq, Venu Govindaraju
ISI
2007
Springer
14 years 1 months ago
Using Digital Chains of Custody on Constrained Devices to Verify Evidence
—A digital chain of custody is an account documenting digital data at a particular place and time. This paper gives a method of validating and authenticating a digital chain of c...
Phillip G. Bradford, Daniel A. Ray
IDTRUST
2010
ACM
13 years 6 months ago
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS)
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Massimiliano Pala