Sciweavers

ICICS
2005
Springer
14 years 27 days ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
ICICS
2005
Springer
14 years 29 days ago
Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails
Efficiently protecting the privacy of multi-recipient emails is not as trivial as it seems. The approach proposed by S/MIME is to concatenate all ciphertexts. However, it suffers ...
Wei Wei, Xuhua Ding, Kefei Chen
ICICS
2005
Springer
14 years 29 days ago
Asymmetric Concurrent Signatures
The concept of concurrent signatures allows two entities to produce two signatures in such a way that, the signer of each signature is ambiguous from a third party’s point of vie...
Khanh Nguyen
ICICS
2005
Springer
14 years 29 days ago
Security Properties of Two Authenticated Conference Key Agreement Protocols
In this paper we analyse the security of two authenticated group key agreement schemes based on the group key agreement protocol of Burmester and Desmedt. One scheme was proposed ...
Qiang Tang, Chris J. Mitchell
ICICS
2005
Springer
14 years 29 days ago
Batching SSL/TLS Handshake Improved
Secure socket layer (SSL) is the most popular protocol to secure Internet communications. Since SSL handshake requires a large amount of computational resource, batch RSA was propo...
Fang Qi, Weijia Jia, Feng Bao, Yongdong Wu
ICICS
2005
Springer
14 years 29 days ago
Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream
Abstract. Multimedia community is moving from monolithic applications to more flexible and scalable integrated solutions. Stream authentication is more complex since a stream may ...
Tieyan Li, Huafei Zhu, Yongdong Wu
ICICS
2005
Springer
14 years 29 days ago
On Delegatability of Four Designated Verifier Signatures
Yong Li 0002, Helger Lipmaa, Dingyi Pei
ICICS
2005
Springer
14 years 29 days ago
Private Itemset Support Counting
Private itemset support counting (PISC) is a basic building block of various privacy-preserving data mining algorithms. Briefly, in PISC, Client wants to know the support of her i...
Sven Laur, Helger Lipmaa, Taneli Mielikäinen
ICICS
2005
Springer
14 years 29 days ago
Reversible Watermark with Large Capacity Using the Predictive Coding
A reversible watermarking algorithm with large capacity has been developed by applying the difference expansion of a generalized integer transform. In this algorithm, a watermark ...
Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tana...
ICICS
2005
Springer
14 years 29 days ago
On the Security of Encryption Modes of MD4, MD5 and HAVAL
Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin...