Sciweavers

1161 search results - page 22 / 233
» Group Message Authentication
Sort
View
CRYPTO
2000
Springer
120views Cryptology» more  CRYPTO 2000»
14 years 17 hour ago
L-collision Attacks against Randomized MACs
In order to avoid birthday attacks on message authentication schemes, it has been suggested that one add randomness to the scheme. One must be careful about how randomness is added...
Michael Semanko
JCP
2007
88views more  JCP 2007»
13 years 7 months ago
Watermarks and Text Transformations in Visual Document Authentication
— Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based...
Igor Fischer, Thorsten Herfet
TWC
2008
129views more  TWC 2008»
13 years 7 months ago
An Efficient Mobile Authentication Scheme for Wireless Networks
In this paper, an efficient authentication scheme is proposed which is suitable for low-power mobile devices. It uses an elliptic-curve-cryptosystem based trust delegation mechanis...
Caimu Tang, Dapeng Oliver Wu
IJNSEC
2011
239views more  IJNSEC 2011»
13 years 2 months ago
Digital Signature Scheme with Message Recovery Using Knapsack-based ECC
Digital signature authentication scheme provides secure communication between two users. Digital signatures guarantee end-to-end message integrity and authentication information a...
R. Rajaram Ramasamy, M. Amutha Prabakar
HICSS
2008
IEEE
126views Biometrics» more  HICSS 2008»
14 years 2 months ago
The Power of We: Using Instant Messaging for Student Group Project Discussion
Online group work has been identified as an important issue in Web-based education for a long time. With the prevalence of instant messaging in adolescents, more and more students...
Aaron X. L. Shen, Christy M. K. Cheung, Matthew K....