Sciweavers

1834 search results - page 212 / 367
» Public Key Cryptography
Sort
View
MICRO
2000
IEEE
95views Hardware» more  MICRO 2000»
13 years 9 months ago
Predicting the Future
We present a novel methodology for predicting future outcomes that uses small numbers of individuals participating in an imperfect information market. By determining their risk att...
IEEECIT
2010
IEEE
13 years 7 months ago
Hiding Short Secret Messages based on Linguistic Steganography and Manual Annotation
—This article shows to what extent it is possible to develop a public simple mechanism for hiding information in natural language by means of the use of templates and manual anno...
Alfonso Muñoz Muñoz, Justo Carracedo...
EUROCRYPT
1997
Springer
14 years 1 months ago
The GCHQ Protocol and Its Problems
The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attem...
Ross J. Anderson, Michael Roe
INFORMATICALT
2007
76views more  INFORMATICALT 2007»
13 years 9 months ago
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker
A modified version of the Bellare and Rogaway (1993) adversarial model is encoded using Asynchronous Product Automata (APA). A model checker tool, Simple Homomorphism Verificatio...
Kim-Kwang Raymond Choo
SCN
2010
Springer
163views Communications» more  SCN 2010»
13 years 7 months ago
Time-Specific Encryption
This paper introduces and explores the new concept of Time-Specific Encryption (TSE). In (Plain) TSE, a Time Server broadcasts a key at the beginning of each time unit, a Time Inst...
Kenneth G. Paterson, Elizabeth A. Quaglia