Sciweavers

164 search results - page 18 / 33
» Password-Based Encryption Analyzed
Sort
View
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 7 months ago
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Although...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
ISPEC
2009
Springer
14 years 2 months ago
On the Correctness of an Approach against Side-Channel Attacks
Abstract. Side-channel attacks are a very powerful cryptanalytic technique. Li and Gu [ProvSec’07] proposed an approach against side-channel attacks, which states that a symmetri...
Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang
MMNS
2001
96views Multimedia» more  MMNS 2001»
13 years 9 months ago
The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over IP Networks
Abstract. With the advent of ubiquitous access to multimedia content via wireless networks, users are more likely to have their data traverse a heterogeneous internetwork. Given th...
Johnathan M. Reason, David G. Messerschmitt
ICMCS
2010
IEEE
146views Multimedia» more  ICMCS 2010»
13 years 8 months ago
Privacy-preserving approximation of L1 distance for multimedia applications
Alice and Bob possess sequences x and y respectively and would like to compute the 1 distance, namely x - y 1 under privacy and communication constraints. The privacy constraint r...
Shantanu Rane, Wei Sun, Anthony Vetro
CORR
2000
Springer
83views Education» more  CORR 2000»
13 years 7 months ago
Agents of Choice: Tools that Facilitate Notice and Choice about Web Site Data Practices
A variety of tools have been introduced recently that are designed to help people protect their privacy on the Internet. These tools perform many different functions including enc...
Lorrie Faith Cranor