Sciweavers

763 search results - page 71 / 153
» Digital Signatures Today
Sort
View
IJNSEC
2010
152views more  IJNSEC 2010»
13 years 4 months ago
Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network
Wireless Mesh Network (WMN) is advocated as the major supporting technology for the next generation wireless Internet satisfying the needs of anywhere-anytime broadband Internet a...
Ramanarayana Kandikattu, Lillykutty Jacob
IACR
2011
136views more  IACR 2011»
12 years 9 months ago
Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
We give new methods for generating and using “strong trapdoors” in cryptographic lattices, which are simultaneously simple, efficient, easy to implement (even in parallel), a...
Daniele Micciancio, Chris Peikert
JODL
2000
65views more  JODL 2000»
13 years 9 months ago
Nature: a prototype digital archive
In response to the proposal to digitise the journal Nature (1869->1992), published by Macmillan, a pilot project was commissioned to discover the technical issues and ascertain...
Ross MacIntyre, Simon Tanner
NORDSEC
2009
Springer
14 years 2 months ago
Formal Analysis of the Estonian Mobile-ID Protocol
In this paper, we report the results of the formal analysis performed on the Estonian Mobile-ID protocol (deployed since 2008), allowing citizens and permanent residents of Estonia...
Peeter Laud, Meelis Roos
PCM
2009
Springer
180views Multimedia» more  PCM 2009»
14 years 2 months ago
RST-Invariant Semi-fragile Image Authentication Based on DWT-Coefficient Quantization
Abstract. In this paper, we propose an image moment-based geometric normalization to be applied before embedding and extracting a digital watermark in the DWT-domain of JPEG2000. A...
Mathias Schlauweg, Erika Müller