Sciweavers

1653 search results - page 257 / 331
» Timed analysis of security protocols
Sort
View
DIM
2009
ACM
14 years 1 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
CCS
2008
ACM
13 years 11 months ago
Towards practical biometric key generation with randomized biometric templates
Although biometrics have garnered significant interest as a source of entropy for cryptographic key generation, recent studies indicate that many biometric modalities may not actu...
Lucas Ballard, Seny Kamara, Fabian Monrose, Michae...
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
14 years 16 days ago
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
The security of hash functions has recently become one of the hottest topics in the design and analysis of cryptographic primitives. Since almost all the hash functions used today ...
Jonathan J. Hoch, Adi Shamir
ICIP
2006
IEEE
14 years 10 months ago
CLIX: Network Coding and Cross Layer Information Exchange of Wireless Video
Network Coding (NC) can be efficiently combined with the "physical layer broadcast" property of wireless mediums to facilitate mutual exchange of independent information...
Shirish S. Karande, Kiran Misra, Hayder Radha
WWW
2006
ACM
14 years 9 months ago
Temporal rules for mobile web personalization
Many systems use past behavior, preferences and environmental factors to attempt to predict user navigation on the Internet. However we believe that many of these models have shor...
Martin Halvey, Mark T. Keane, Barry Smyth