Sciweavers

1618 search results - page 196 / 324
» Testing random number generators
Sort
View
INFORMATICALT
2010
132views more  INFORMATICALT 2010»
14 years 11 months ago
An Improved Securer and Efficient Nonce-Based Authentication Scheme with Token-Update
In this paper, we propose a mutual authentication scheme using nonce variable instead of Mac address and accompanying with token updates to improve the functionality. Lee et al. (2...
Chiu-Hsiung Liao, Ching-Te Wang, Hon-Chan Chen
JDCTA
2010
250views more  JDCTA 2010»
14 years 9 months ago
A Novel Non-Expansion Visual Secret Sharing Scheme For Binary Image
In visual cryptography, the secret can be any written text, graphical representation, or picture. This technique, some time called visual secret sharing (VSS), allows visual infor...
Thekra Abbas, Zou Beiji
CEAS
2008
Springer
15 years 4 months ago
Improved Phishing Detection using Model-Based Features
Phishing emails are a real threat to internet communication and web economy. Criminals are trying to convince unsuspecting online users to reveal passwords, account numbers, socia...
André Bergholz, Jeong Ho Chang, Gerhard Paa...
SCAM
2006
IEEE
15 years 8 months ago
Constructing Accurate Application Call Graphs For Java To Model Library Callbacks
Call graphs are widely used to represent calling relationships among methods. However, there is not much interest in calling relationships among library methods in many software e...
Weilei Zhang, Barbara G. Ryder
BMCBI
2006
96views more  BMCBI 2006»
15 years 2 months ago
Structure alignment based on coding of local geometric measures
Background: A structure alignment method based on a local geometric property is presented and its performance is tested in pairwise and multiple structure alignments. In this appr...
Peter L. Chang, Andrew W. Rinne, T. Gregory Dewey