Sciweavers

153 search results - page 30 / 31
» Efficient lattice-based signature scheme
Sort
View
GLOBECOM
2007
IEEE
14 years 1 months ago
Performing Packet Content Inspection by Longest Prefix Matching Technology
—This article presents a novel mechanism to perform packet content inspection by longest prefix matching (LPM) technology. It is done by transforming the automaton-based state ta...
Nen-Fu Huang, Yen-Ming Chu, Yen-Min Wu, Chia-Wen H...
CCS
2006
ACM
13 years 10 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 7 months ago
Perceptual Copyright Protection Using Multiresolution Wavelet-Based Watermarking And Fuzzy Logic
In this paper, an efficiently DWT-based watermarking technique is proposed to embed signatures in images to attest the owner identification and discourage the unauthorized copying...
Ming-Shing Hsieh
ENTCS
2008
132views more  ENTCS 2008»
13 years 7 months ago
Distributed Verification of Multi-threaded C++ Programs
Verification of multi-threaded C++ programs poses three major challenges: the large number of states, states with huge sizes, and time intensive expansions of states. This paper p...
Stefan Edelkamp, Shahid Jabbar, Damian Sulewski
IJISEC
2006
106views more  IJISEC 2006»
13 years 6 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis