Sciweavers

743 search results - page 82 / 149
» Secure Signature Schemes based on Interactive Protocols
Sort
View
ECBS
2008
IEEE
113views Hardware» more  ECBS 2008»
13 years 7 months ago
Towards Secure Mobile Payment Based on SIP
Mobile payment has some unique advantages over more traditional payment methods in, for example, TV shopping and mobile multimedia services. Unfortunately, most existing mobile pa...
Ge Zhang, Feng Cheng 0002, Christoph Meinel
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
13 years 5 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
IPPS
2007
IEEE
14 years 2 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
CRYPTOLOGIA
2006
155views more  CRYPTOLOGIA 2006»
13 years 7 months ago
The Whirlpool Secure Hash Function
In this paper, we describe Whirlpool, which is a block-cipher-based secure hash function. Whirlpool produces a hash code of 512 bits for an input message of maximum length less tha...
William Stallings
ICC
2007
IEEE
187views Communications» more  ICC 2007»
14 years 2 months ago
A Rate Control Scheme for Adaptive Video Streaming Over the Internet
—In this paper, we propose a new streaming protocol, namely Dynamic Video Rate Control (DVRC), which enables adaptive video delivery over the Internet. DVRC operates on top of UD...
Panagiotis Papadimitriou, Vassilis Tsaoussidis