Sciweavers

632 search results - page 19 / 127
» Two Facets of Authentication
Sort
View
ESORICS
2007
Springer
14 years 3 months ago
Completeness of the Authentication Tests
Protocol participants manipulate values, transforming the cryptographic contexts in which they occur. The rules of the protocol determine which transformations are permitted. We fo...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...
INFORMATICALT
2002
118views more  INFORMATICALT 2002»
13 years 9 months ago
Cryptanalysis and Improvement of Key Distribution System for VSAT Satellite Communications
Recently, Park and Lim (1998) proposed two key distribution systems for secure VSAT satellite communications. One provides indirect authentication, and another scheme enables that ...
Yuh-Min Tseng
ICIP
2004
IEEE
14 years 11 months ago
Progressive protection of jpeg2000 codestreams
This paper presents an authentication scheme and an access control scheme for JPEG2000 image codestreams based on hash chains. Both schemes are fully compatible with the core part...
Yongdong Wu, Di Ma, Robert H. Deng
TMC
2008
90views more  TMC 2008»
13 years 9 months ago
Trust-Based Fast Authentication for Multiowner Wireless Networks
In multiowner wireless networks, access points (APs) are owned and operated by different administrations, leading to significant authentication delays during handoff between APs. W...
Jahan Hassan, Harsha Sirisena, Björn Landfeld...
SIAMCO
2010
108views more  SIAMCO 2010»
13 years 8 months ago
Reach Control on Simplices by Continuous State Feedback
This paper studies a theoretical problem of whether continuous state feedback and affine feedback are equivalent from the point of view of making an affine system defined on a sim...
Mireille E. Broucke