Sciweavers

632 search results - page 24 / 127
» Two Facets of Authentication
Sort
View
CORR
2010
Springer
65views Education» more  CORR 2010»
13 years 7 months ago
A Note on Solid Coloring of Pure Simplicial Complexes
We establish a simple generalization of a known result in the plane. The simplices in any pure simplicial complex in Rd may be colored with d+1 colors so that no two simplices tha...
Joseph O'Rourke
ISCC
2006
IEEE
14 years 3 months ago
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks
— Security and QoS are two main issues for a successful wide deployment of multicast services. For instance, in a multicast streaming application, a receiver would require a data...
Yoann Hinard, Hatem Bettahar, Yacine Challal, Abde...
PG
2007
IEEE
14 years 3 months ago
Extending Catmull-Clark Subdivision and PCCM with Polar Structures
We complete and bring together two pairs of surface constructions that use polynomial pieces of degree (3,3) to associate a smooth surface with a mesh. The two pairs complement ea...
Ashish Myles, Kestutis Karciauskas, Jörg Pete...
ARC
2007
Springer
119views Hardware» more  ARC 2007»
14 years 3 months ago
Authentication of FPGA Bitstreams: Why and How
Abstract. Encryption of volatile FPGA bitstreams provides confidentiality to the design but does not ensure its authenticity. This paper motivates the need for adding authenticati...
Saar Drimer
SP
1996
IEEE
136views Security Privacy» more  SP 1996»
14 years 1 months ago
On two Proposals for On-line Bankcard Payments using Open Networks: Problems and Solutions
Recently, two major bankcard payment instrument operators VISA and MasterCard published speci cations for securing bankcard payment transactions on open networks for open scrutiny...
Wenbo Mao