Sciweavers

849 search results - page 53 / 170
» Secure Applications of Low-Entropy Keys
Sort
View
ICICS
2010
Springer
13 years 8 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
ICISS
2010
Springer
13 years 7 months ago
Unifying Facets of Information Integrity
Abstract. Information integrity is a vital security property in a variety of applications. However, there is more than one facet to integrity: interpretations of integrity in diffe...
Arnar Birgisson, Alejandro Russo, Andrei Sabelfeld
CCS
2001
ACM
14 years 2 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
CSREASAM
2006
13 years 11 months ago
A New Approach For Source Authentication Of Multicast Data
Multicast Security is one of the important problems to solve for the successful deployment of group communication applications, and source authentication of multicast data is a key...
Jinxin He, Gaochao Xu, Zhiguo Zhou, Guannan Gong
ACSAC
2003
IEEE
14 years 3 months ago
How to unwittingly sign non-repudiable documents with Java applications
Digital signatures allow us to produce documents whose integrity and authenticity, as we generated them, is verifiable by anybody who has access to our public key. Furthermore, w...
Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti