A family of authenticators based on static shared keys is identified and proven secure. The authenticators can be used in a variety of settings, including identity-based ones. App...
What characteristics of an email message make it more likely to be discarded? Statistical analyses of a set of deleted and non-deleted messages revealed several factors that were ...
Laura Dabbish, Gina Danielle Venolia, Jonathan J. ...
In this paper we investigate the watermarking authentication when applied to medical imagery field. We first give an overview of watermarking technology by paying attention to frag...
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. 's LCSS RFID authentication protocol, Song and Mitchell's protocol are...
Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation i...
Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy,...