Sciweavers

763 search results - page 47 / 153
» Digital Signatures Today
Sort
View
ICDS
2007
IEEE
14 years 4 months ago
New Approach for Cellular Network Improvement
— In an attempt to optimize network performance of delivered 2G and 3G services and reduce operating costs, today's mobile operators are searching for aggregation and concen...
Stanislav Milanovic
HICSS
2007
IEEE
112views Biometrics» more  HICSS 2007»
14 years 4 months ago
Hardware-Assisted Scanning for Signature Patterns in Image File Fragments
The ability to detect fragments of deleted image files and to reconstruct these image files from all available fragments on disk is an important activity in the field of digital f...
Yoginder S. Dandass
PTS
2007
120views Hardware» more  PTS 2007»
13 years 11 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König
ICNS
2009
IEEE
14 years 4 months ago
Counter-Flooding: DoS Protection for Public Key Handshakes in LANs
—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
Yves Igor Jerschow, Björn Scheuermann, Martin...
CCS
2006
ACM
14 years 1 months ago
Lightweight, pollution-attack resistant multicast authentication scheme
Authentication is an important security measure for multicast applications, providing receivers with confidence that the packets they receive are valid. Simply signing every multi...
Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin