Sciweavers

66 search results - page 3 / 14
» Universal Hashing and Authentication Codes
Sort
View
ICCSA
2010
Springer
14 years 2 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim
ICIP
2006
IEEE
14 years 9 months ago
Tamper-Localization Watermarking with Systematic Error Correcting Code
Abstract-- This paper presents an authentication watermarking method which can localize the tampering regions in fine granularity. Unlike the previous block-wise Tampering-Localiza...
Yongdong Wu
CRYPTO
2000
Springer
89views Cryptology» more  CRYPTO 2000»
13 years 12 months ago
On the Round Security of Symmetric-Key Cryptographic Primitives
We put forward a new model for understanding the security of symmetric-key primitives, such as block ciphers. The model captures the fact that many such primitives often consist of...
Zulfikar Ramzan, Leonid Reyzin
CORR
2008
Springer
69views Education» more  CORR 2008»
13 years 7 months ago
Hash Property and Fixed-rate Universal Coding Theorems
Jun Muramatsu, Shigeki Miyake
ICIP
2003
IEEE
14 years 9 months ago
Dither-based secure image hashing using distributed coding
We propose an image hashing algorithm that is based on distributed compression principles. The algorithm assumes the availability of a robust feature vector extracted from the ima...
Mark Johnson, Kannan Ramchandran