Sciweavers

905 search results - page 53 / 181
» Public key distribution through
Sort
View
SSWMC
2004
13 years 10 months ago
Searching for the stego-key
Steganalysis in the wide sense consists of first identifying suspicious objects and then further analysis during which we try to identify the steganographic scheme used for embedd...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
IMSA
2001
132views Multimedia» more  IMSA 2001»
13 years 10 months ago
Performance of Zebra Routing Software
Zebra is publicly available free routing software that is distributed under GNU General Public License. It supports the following IP routing protocols: BGP-4, RIPv1, RIPv2 and OSP...
R. Fatoohi, R. Singh
STORAGESS
2005
ACM
14 years 2 months ago
Secure capabilities for a petabyte-scale object-based distributed file system
Recently, the Network-Attached Secure Disk (NASD) model has become a more widely used technique for constructing large-scale storage systems. However, the security system proposed...
Christopher Olson, Ethan L. Miller
FC
2004
Springer
120views Cryptology» more  FC 2004»
14 years 2 months ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
EGC
2005
Springer
14 years 2 months ago
Experiences of Applying Advanced Grid Authorisation Infrastructures
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured that the security mechanisms needed to support Grid based collaborations are at l...
Richard O. Sinnott, A. J. Stell, David W. Chadwick...