Sciweavers

1045 search results - page 123 / 209
» On the Security of Digital Tachographs
Sort
View
CORR
2004
Springer
107views Education» more  CORR 2004»
13 years 10 months ago
Security of public key cryptosystems based on Chebyshev Polynomials
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptogra...
Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Lju...
CIIA
2009
13 years 11 months ago
LCF-style for Secure Verification Platform based on Multiway Decision Graphs
Abstract. Formal verification of digital systems is achieved, today, using one of two main approaches: states exploration (mainly model checking and equivalence checking) or deduct...
Sa'ed Abed, Otmane Aït Mohamed
JTAER
2008
100views more  JTAER 2008»
13 years 10 months ago
Securing Uniqueness of Rights e-Documents: A Deontic Process Perspective
We typically think of documents as carrying information. However, certain kinds of documents do more than that: they are not only informative but also performative in that they re...
Ronald M. Lee, Vu Nguyen, Anastasia Pagnoni
PKC
1998
Springer
126views Cryptology» more  PKC 1998»
14 years 2 months ago
Certifying Trust
A basic function of all signatures, digital or not, is to express trust and authority, explicit or implied. This is especially the case with digital signatures used in certificates...
Ilari Lehti, Pekka Nikander
SSWMC
2004
13 years 11 months ago
Advanced audio watermarking benchmarking
Digital watermarking is envisaged as a potential technology for copyright protection and manipulation recognition. A key issue in the usage of robust watermarking is the evaluatio...
Jana Dittmann, Martin Steinebach, Andreas Lang, Sa...