Search

Your search keyword '"Message authentication code"' showing total 125 results

Search Constraints

Start Over You searched for: Descriptor "Message authentication code" Remove constraint Descriptor: "Message authentication code" Publisher ieee comput. soc Remove constraint Publisher: ieee comput. soc
125 results on '"Message authentication code"'

Search Results

1. Digital evidence collection process in integrity and memory information gathering

2. Development of personal authentication system using fingerprint with digital signature technologies

3. Application intrusion detection using language library calls

4. Seamless object authentication in different security policy domains

5. Implementing the intrusion detection exchange protocol

6. Partitioning attacks: or how to rapidly clone some GSM cards

7. Efficient multicast packet authentication using signature amortization

8. Expander graphs for digital stream authentication and robust overlay networks

9. Talk on activities of security and grid computing service project

10. A semifragile watermark scheme for image authentication

11. A hierarchical signature scheme for robust video authentication using secret sharing

12. Dynamic context-aware access control for grid applications

13. Architectural defects of the secure shell

14. Ubiquitous Internet access control: the PAPI system

15. A novel Web security evaluation model for a one-time-password system

16. A secure group key management framework: design and rekey issues

17. Distributed data authentication

18. Design and performance evaluation of a flexible and efficient server assisted signature protocol

19. Secret key cryptography with cellular automata

20. The unlinkability of randomization-enhanced Chaum's blind signature scheme

21. Dynamic trust-based resource allocation

22. Are e-commerce users defenceless?

23. Efficient and scalable infrastructure support for dynamic coalitions

24. Secure authentication watermarking for binary images

25. Prophylactic, treatment and containment techniques for ensuring active network security

26. Pesto flavored security

27. Building universal profile systems over a peer-to-peer network

28. Federation Web: a scheme to compound authorization chains on large-scale distributed systems

29. Security aspects of wireless heterogeneous databases - protocol, performance, and energy analysis

30. A hypersphere oriented key exchange scheme for multiparty

31. Source authentication in group communication systems

32. Attribute-based interactions in a distributed authentication and unauthorization infrastructure

33. Some protocols useful on the Internet from threshold signature schemes

34. Certified e-mail systems using public notice board

35. Towards a logic of privacy-preserving selective disclosure credential protocols

36. Practical asymmetric fingerprinting with a TTP

37. Supporting digital signatures in mobile environments

38. A flexible role-based secure messaging service: exploiting IBE technology for privacy in health care

39. A procedure for verifying security against type confusion attacks

40. Fairness in wallets with observer

41. A protocol for programmable smart cards

42. New key improvements and its application to XTR system

43. An enhanced authentication key exchange protocol

44. Signature schemes based on two hard problems simultaneously

45. A non-repudiation message transfer protocol for e-commerce

46. Secure transmission of the prescription order communication system based on the internet and the public-key infrastructure using master smart cards in the 2-way type terminal

47. Streamed or detached triple integrity for a time stamped secure storage system

48. Distributed authentication for peer-to-peer networks

49. On the (non)universality of the one-time pad

50. A prototype of security for active networks

Catalog

Books, media, physical & digital resources