This site uses cookies to deliver our services and to ensure you get the best experience. By continuing to use this site, you consent to our use of cookies and acknowledge that you have read and understand our Privacy Policy, Cookie Policy, and Terms
We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We pre...
Ulrike Korte, Michael Krawczak, Johannes Merkle, R...
: The strongly discussed EU Data Retention directive 2006/24/EC released in 2006 requires the operators of publicly accessible electronic communication networks to retain traffic a...
Gerald Stampfel, Wilfried N. Gansterer, Martin Ilg...
: Content reuse on the Web is becoming even more common since the Web 2.0 "phenomenon". However, each time content is reused certain information is either completely lost...
Abstract: Client-side attacks are on the rise: malicious websites that exploit vulnerabilities in the visitor's browser are posing a serious threat to client security, comprom...
Abstract: The NTRU encryption scheme is an interesting alternative to well-established encryption schemes such as RSA, ElGamal, and ECIES. The security of NTRU relies on the hardne...