Sciweavers

456 search results - page 17 / 92
» Rethinking Digital Signatures
Sort
View
MFCS
1990
Springer
13 years 11 months ago
One-Way Functions in Complexity Theory
We introduce the notion of associative one-way functions and prove that they exist if and only if P 6= NP. As evidence of their utility, we present two novel protocols that apply ...
Alan L. Selman
TCSV
2008
140views more  TCSV 2008»
13 years 7 months ago
Face-Based Digital Signatures for Video Retrieval
The characterization of a video segment by a digital signature is a fundamental task in video processing. It is necessary for video indexing and retrieval, copyright protection and...
Costas I. Cotsaces, Nikos Nikolaidis, Ioannis Pita...
MMSEC
2005
ACM
210views Multimedia» more  MMSEC 2005»
14 years 1 months ago
Composite signature based watermarking for fingerprint authentication
Digital watermarking is a technology to hide information in digital media. We extend the digital watermarking technique Phasemark™, originally developed solely for image authent...
Farid Ahmed, Ira S. Moskowitz
FTDCS
2003
IEEE
14 years 27 days ago
Adopting Redundancy Techniques for Multicast Stream Authentication
Various schemes have been proposed to achieve strong authenticationof streamed data in a lossy network by means of “light” digital signatures. Such techniques perform a strong...
Tommaso Cucinotta, Gabriele Cecchetti, Gianluca Fe...
CSFW
2005
IEEE
14 years 1 months ago
Deciding Knowledge in Security Protocols under (Many More) Equational Theories
In the analysis of security protocols, the knowledge of attackers is often described in terms of message deducibility and indistinguishability relations. In this paper, we pursue ...
Martín Abadi, Véronique Cortier