Sciweavers

2421 search results - page 142 / 485
» Message from the Editor-in-Chief
Sort
View
INFORMATICALT
2007
109views more  INFORMATICALT 2007»
13 years 10 months ago
A Secure YS-Like User Authentication Scheme
Abstract. Recently, there are several articles proposed based on Yang and Shieh’s password authentication schemes (YS for short) with the following features: (1) A user can choos...
Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu
JCP
2007
88views more  JCP 2007»
13 years 10 months ago
Watermarks and Text Transformations in Visual Document Authentication
— Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based...
Igor Fischer, Thorsten Herfet
JOC
2007
129views more  JOC 2007»
13 years 10 months ago
Formal Proofs for the Security of Signcryption
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both message confidentiality and unforgeability at a lower computational and communica...
Joonsang Baek, Ron Steinfeld, Yuliang Zheng
JSAC
2007
87views more  JSAC 2007»
13 years 10 months ago
Hidden-Action in Network Routing
— In communication networks, such as the Internet or mobile ad-hoc networks, the actions taken by intermediate nodes or links are typically hidden from the communicating endpoint...
Michal Feldman, John Chuang, Ion Stoica, Scott She...
JSW
2007
126views more  JSW 2007»
13 years 10 months ago
Supporting UML Sequence Diagrams with a Processor Net Approach
— UML sequence diagrams focus on the interaction between different classes. For distributed real time transaction processing it is possible to end up with complex sequence diagra...
Tony Spiteri Staines