Sciweavers

155 search results - page 20 / 31
» Hash Based Digital Signature Schemes
Sort
View
ACISP
2006
Springer
14 years 2 months ago
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered a...
Shidi Xu, Yi Mu, Willy Susilo
AMC
2005
188views more  AMC 2005»
13 years 10 months ago
An efficient signcryption scheme with forward secrecy based on elliptic curve
An efficient signcryption scheme based on elliptic curve is proposed in this paper. The signcryption scheme combines digital signature and encryption functions. The proposed schem...
Ren-Junn Hwang, Chih-Hua Lai, Feng-Fu Su
ICICS
2005
Springer
14 years 4 months ago
Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream
Abstract. Multimedia community is moving from monolithic applications to more flexible and scalable integrated solutions. Stream authentication is more complex since a stream may ...
Tieyan Li, Huafei Zhu, Yongdong Wu
ICDE
2004
IEEE
120views Database» more  ICDE 2004»
15 years 6 days ago
Algebraic Signatures for Scalable Distributed Data Structures
Signatures detect changes to the data objects. Numerous schemes a known, e.g., the popular hash based SHA-1 standard. We propose a nov scheme we call algebraic signatures. We use ...
Witold Litwin, Thomas J. E. Schwarz
ISCAS
2005
IEEE
152views Hardware» more  ISCAS 2005»
14 years 4 months ago
Error resilient content-based image authentication over wireless channel
—The pervasive distribution of digital images triggers an emergent need of authenticating degraded images by lossy compression and transmission. This paper proposes a robust cont...
Shuiming Ye, Qibin Sun, Ee-Chien Chang