Sciweavers

1834 search results - page 229 / 367
» Public Key Cryptography
Sort
View
96
Voted
CIIT
2004
15 years 4 months ago
Signal processing tools for speech recognition
This paper describes the design and development of a set of signal processing software tools for speech recognition. The tools were developed for inclusion in a comprehensive publ...
Hualin Gao, Richard Duncan, Julie Baca, Joseph Pic...
121
Voted
ISICT
2003
15 years 4 months ago
Security protocols for 2G and 3G wireless communications
Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in c...
T. Newe, Tom Coffey
113
Voted
SCN
2008
Springer
116views Communications» more  SCN 2008»
15 years 2 months ago
General Certificateless Encryption and Timed-Release Encryption
While recent timed-release encryption (TRE) schemes are implicitly supported by a certificateless encryption (CLE) mechanism, the security models of CLE and TRE differ and there is...
Sherman S. M. Chow, Volker Roth, Eleanor G. Rieffe...
108
Voted
IJNSEC
2007
128views more  IJNSEC 2007»
15 years 2 months ago
LFSR-based Signatures with Message Recovery
In order to reduce key sizes and bandwidth, several LFSRbased (linear feedback shift register) public key cryptosystems and signature schemes have been proposed. Digital signature...
Xiangxue Li, Dong Zheng, Kefei Chen
106
Voted
JCP
2007
103views more  JCP 2007»
15 years 2 months ago
Conformance Testing a Set of Criteria for Assessing Trust
—The ability to authenticate the identity of an entity in an open and insecure environment such as the Internet plays an important role in reducing potential threats and Public k...
Omar Batarfi, Lindsay Marshall