Sciweavers

2421 search results - page 187 / 485
» Message from the Co-Chairs
Sort
View
CN
2006
83views more  CN 2006»
13 years 9 months ago
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
This paper presents an assessment of the communication overheads of IPsec and evaluates the feasibility of deploying it on handheld devices for the UMTS architecture. A wide range...
Christos Xenakis, Nikolaos Laoutaris, Lazaros F. M...
CORR
2006
Springer
90views Education» more  CORR 2006»
13 years 9 months ago
A constructive and unifying framework for zero-bit watermarking
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in a piece of content. The watermark detector checks ...
Teddy Furon
IJNSEC
2008
143views more  IJNSEC 2008»
13 years 9 months ago
New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme
In 2005, Lee, Kim, and Yoo proposed a nonce-based mutual authentication scheme using smart cards. However, this paper demonstrates that Lee-Kim-Yoo's scheme is vulnerable to ...
Da-Zhi Sun, Zhen-Fu Cao
CORR
2007
Springer
138views Education» more  CORR 2007»
13 years 9 months ago
Low Density Lattice Codes
— Low density lattice codes (LDLC) are novel lattice codes that can be decoded efficiently and approach the capacity of the additive white Gaussian noise (AWGN) channel. In LDLC...
Naftali Sommer, Meir Feder, Ofir Shalvi
JCM
2008
138views more  JCM 2008»
13 years 9 months ago
Cryptanalysis of Some RFID Authentication Protocols
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. 's LCSS RFID authentication protocol, Song and Mitchell's protocol are...
Tianjie Cao, Peng Shen, Elisa Bertino