Sciweavers

487 search results - page 19 / 98
» Integral Invariant Signatures
Sort
View
SSS
2009
Springer
14 years 4 months ago
A Wireless Security Framework without Shared Secrets
This paper develops a framework for wireless security that provides confidentiality, identity authentication, message authentication, integrity, sender non-repudiation, receiver n...
Lifeng Sang, Anish Arora
ASIACRYPT
1992
Springer
14 years 1 months ago
On the Power of Memory in the Design of Collision Resistant Hash Functions
Collision resistant hash functions are an important basic tool for cryptographic applications such as digital signature schemes and integrity protection based on "fingerprinti...
Bart Preneel, René Govaerts, Joos Vandewall...
CORR
2006
Springer
72views Education» more  CORR 2006»
13 years 10 months ago
A secure archive for Voice-over-IP conversations
An efficient archive securing the integrity of VoIP-based two-party conversations is presented. The solution is based on chains of hashes and continuously chained electronic signa...
Christian Hett, Nicolai Kuntze, Andreas U. Schmidt
ICIP
2004
IEEE
14 years 11 months ago
Robust optical flow from photometric invariants
Optical flow is widely in use in the field of image processing. In general, optical flow is computed from luminance images. However, optical flow based on luminance information hi...
Joost van de Weijer, Theo Gevers
CAV
2011
Springer
202views Hardware» more  CAV 2011»
13 years 1 months ago
Simplifying Loop Invariant Generation Using Splitter Predicates
Abstract. We present a novel static analysis technique that substantially improves the quality of invariants inferred by standard loop invariant generation techniques. Our techniqu...
Rahul Sharma 0001, Isil Dillig, Thomas Dillig, Ale...