Sciweavers

923 search results - page 163 / 185
» Improved Slide Attacks
Sort
View
ICISC
2003
89views Cryptology» more  ICISC 2003»
15 years 5 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
USS
2004
15 years 5 months ago
Static Disassembly of Obfuscated Binaries
Disassembly is the process of recovering a symbolic representation of a program's machine code instructions from its binary representation. Recently, a number of techniques h...
Christopher Krügel, William K. Robertson, Fre...
CCS
2010
ACM
15 years 4 months ago
Recruiting new tor relays with BRAIDS
Tor, a distributed Internet anonymizing system, relies on volunteers who run dedicated relays. Other than altruism, these volunteers have no incentive to run relays, causing a lar...
Rob Jansen, Nicholas Hopper, Yongdae Kim
ADHOC
2007
133views more  ADHOC 2007»
15 years 4 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
124
Voted
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 3 months ago
Wide spread spectrum watermarking with side information and interference cancellation
Nowadays, a popular method used for additive watermarking is wide spread spectrum. It consists in adding a spread signal into the host document. This signal is obtained by the sum...
Gaëtan Le Guelvouit, Stéphane Pateux