Sciweavers

4413 search results - page 641 / 883
» Security for biometric data
Sort
View
CRYPTO
2000
Springer
123views Cryptology» more  CRYPTO 2000»
15 years 9 months ago
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm
Abstract. We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel including two key recovery attacks and a forgery attack. Unlike previous attacks, th...
Don Coppersmith, Lars R. Knudsen, Chris J. Mitchel...
VLDB
1998
ACM
116views Database» more  VLDB 1998»
15 years 8 months ago
The Heterogeneity Problem and Middleware Technology: Experiences with and Performance of Database Gateways
In this paper, we present the results that we have obtained by comparing and testing three well-known database middleware solutions. We have analyzed their features related to glo...
Fernando de Ferreira Rezende, Klaudia Hergula
ICICS
1997
Springer
15 years 8 months ago
Stateless connections
We describe a secure transformation of stateful connections or parts of them into stateless ones by attaching the state information to the messages. Secret-key cryptography is used...
Tuomas Aura, Pekka Nikander
EV
2008
86views Hardware» more  EV 2008»
15 years 6 months ago
Long-term Retention in E-Voting - Legal Requirements and Technical Implementation
: Legally binding elections require retention of specified election data such as balloting material. This applies to paper-based as well as electronic elections. However, in German...
Rotraud Gitter, Lucie Langer, Susanne Okunick, Zoi...
WICON
2008
15 years 6 months ago
Using the EAP framework for fast media independent handover authentication
In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover: namely, re-authentication a...
Antonio Izquierdo, Nada Golmie, Katrin Hoeper, Lid...