Sciweavers

468 search results - page 25 / 94
» Security Weaknesses in Bluetooth
Sort
View
AFRICACRYPT
2008
Springer
14 years 1 months ago
A Brief History of Provably-Secure Public-Key Encryption
Public-key encryption schemes are a useful and interesting field of cryptographic study. The ultimate goal for the cryptographer in the field of public-key encryption would be th...
Alexander W. Dent
ICMCS
2006
IEEE
128views Multimedia» more  ICMCS 2006»
14 years 1 months ago
On the Security of Multimedia Encryption Schemes Based on Multiple Huffman Table (MHT)
This paper addresses the security issues of the multimedia encryption schemes based on multiple Huffman table (MHT). A detailed analysis of known-plaintext attack is presented to ...
Jiantao Zhou, Zhiqin Liang, Yan Chen, Oscar C. Au
GSEM
2004
Springer
14 years 27 days ago
Enhancing Java Grid Computing Security with Resource Control
Abstract. This paper outlines an original Computational Grid deployment protocol which is entirely based on Java, leveraging the portability of this language for distributing custo...
Jarle Hulaas, Walter Binder, Giovanna Di Marzo Ser...
EVOTING
2004
94views Hardware» more  EVOTING 2004»
13 years 9 months ago
How Security Problems can Compromise Remote Internet Voting Systems
: Remote Internet voting systems still suffer from many security problems which rely on the clients, the servers, and the network connections. Denial-ofservice attacks and viruses ...
Guido Schryen
COMCOM
1998
81views more  COMCOM 1998»
13 years 7 months ago
Secure broadcasting in large networks
In this note, we show that a proposed secure broadcasting scheme is insecure. We also present a modified scheme to overcome this weakness. The modified scheme has the extra adva...
Hung-Min Sun, Shiuh-Pyng Shieh