Sciweavers

56 search results - page 2 / 12
» ijnsec 2007
Sort
View
IJNSEC
2007
89views more  IJNSEC 2007»
13 years 10 months ago
Vulnerabilities in the Adachi-Aoki-Komano-Ohta Micropayment Scheme
Rivest and Shamir presented two simple micropayment schemes, “PayWord” and “MicroMint,” for making small purchases over the Internet [14]. Recently, Adachi et al. have poi...
Minho Kim, Çetin Kaya Koç
IJNSEC
2007
131views more  IJNSEC 2007»
13 years 10 months ago
On the Security of Huang-Chang Multi-signature Schemes
Recently, based on RSA and discrete logarithm with composite modulus, Huang and Chang proposed two multisignature schemes with distinguished signing authority and claimed that the...
Jianhong Zhang, Wei Zou
IJNSEC
2007
128views more  IJNSEC 2007»
13 years 10 months ago
A Comprehensive Secure VoIP Solution
VoIP represents the future of digital voice communications and many carriers are preparing for the VoIP revolution. However, a number of outstanding issues need to be settled. The...
Ashraf D. Elbayoumy, Simon J. Shepherd
IJNSEC
2007
96views more  IJNSEC 2007»
13 years 10 months ago
Research on Data Hiding Capacity
To hide data in credentials is a key problem in information security. In this paper, a summary of the work on data hiding-capacity is made and several communication channel models...
Zhensong Liao, Yan Huang, Chisong Li
IJNSEC
2007
109views more  IJNSEC 2007»
13 years 10 months ago
Related-Mode Attacks on CTR Encryption Mode
In this paper, we discuss using CTR mode, another standard encryption mode, to attack other standard encryption modes and using other standard encryption modes to attack CTR mode ...
Dayin Wang, Dongdai Lin, Wenling Wu