Sciweavers

790 search results - page 46 / 158
» Designated Confirmer Signatures
Sort
View
IPCCC
2005
IEEE
14 years 2 months ago
A key distribution scheme for double authentication in link state routing protocol
The Double Authentication (DA) scheme presented in [1] is designed to provide security against impersonation attack to link state routing protocol at a lower computational cost as...
D. Huang, A. Sinha, D. Medhi
PKC
1998
Springer
126views Cryptology» more  PKC 1998»
14 years 1 months ago
Certifying Trust
A basic function of all signatures, digital or not, is to express trust and authority, explicit or implied. This is especially the case with digital signatures used in certificates...
Ilari Lehti, Pekka Nikander
APNOMS
2006
Springer
14 years 22 days ago
An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks
Abstract. Recently the concept of personal PKI was introduced to describe a public key infrastructure specifically designed to support the distribution of public keys in a personal...
Chul Sur, Kyung Hyune Rhee
AUSFORENSICS
2003
13 years 10 months ago
Honeyd - A OS Fingerprinting Artifice
This research looks at the efficiency of the honeyd honeypot system to reliably deceive intruders. Honeypots are being used as frontline network intelligence and forensic analysis...
Craig Valli
DSP
2010
13 years 9 months ago
A diffusion framework for detection of moving vehicles
Automatic acoustic-based vehicle detection is a common task in security and surveillance systems. Usually, a recording device is placed in a designated area and a hardware/softwar...
Alon Schclar, Amir Averbuch, N. Rabin, Valery A. Z...