Sciweavers

362 search results - page 35 / 73
» Extending the Resynchronization Attack
Sort
View
MEDIAFORENSICS
2010
13 years 11 months ago
Better security levels for broken arrows
This paper considers the security aspect of the robust zero-bit watermarking technique `Broken Arrows'(BA),1 which was invented and tested for the international challenge BOW...
Fuchun Xie, Teddy Furon, Caroline Fontaine
CRYPTO
2007
Springer
134views Cryptology» more  CRYPTO 2007»
14 years 4 months ago
Domain Extension of Public Random Functions: Beyond the Birthday Barrier
A public random function is a random function that is accessible by all parties, including the adversary. For example, a (public) random oracle is a public random function {0, 1}...
Ueli M. Maurer, Stefano Tessaro
CSFW
2006
IEEE
14 years 3 months ago
Decentralized Robustness
Robustness links confidentiality and integrity properties of a computing system and has been identified as a useful property for characterizing and enforcing security. Previous ...
Stephen Chong, Andrew C. Myers
LPNMR
1993
Springer
14 years 1 months ago
An Assumption-Based Framework for Non-Monotonic Reasoning
The notion of assumption-based framework generalises and re nes the use of abduction to give a formalisation of non-monotonic reasoning. In this framework, a sentence is a non-mon...
Andrei Bondarenko, Francesca Toni, Robert A. Kowal...
IWSEC
2010
Springer
13 years 8 months ago
Securing MANET Multicast Using DIPLOMA
Multicast traffic, such as live audio/video streaming, is an important application for Mobile Ad Hoc Networks (MANETs), including those used by militaries and disaster recovery tea...
Mansoor Alicherry, Angelos D. Keromytis