نتایج جستجو برای: wise foundations authentication

تعداد نتایج: 90938  

1999
Svetla Nikova Ventzislav Nikov

Recent years have seen numerous examples when designs play an important role in the study of such topics in cryptography as secrecy and authentication codes, secret sharing schemes, correlation-immune and resilient functions. In this paper we give applications of some methods and results from the design theory, especially bounding the optimal size of the designs and codes, to cryptography. We g...

2001
Bert den Boer Bart Van Rompay Bart Preneel Joos Vandewalle

We present a new message authentication code. It is based on a two trail construction, which underlies the unkeyed hash function RIPEMD-160. It is in comparison with the MDx-MAC based on RIPEMD-160, much more efficient on short messages (that is on messages of 512 or 1024 bits) and percentage-wise a little bit more efficient on long messages. Moreover, it handles key-changes very efficiently. T...

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

2012
Sravan Kumar D. Sravan Kumar

Cryptography is a key technology in electronic security systems. Modern cryptographic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. The increased use of computer and communication systems by industry has increased the risk of theft of proprietary information. In general, cryptographic primitives a...

2002
Nestor Tsirliganis George Pavlidis Anestis Koutsoudis Despina Papadopoulou Apostolos Tsompanopoulos Konstantinos Stavroglou Zacharenia Loukou Christodoulos Chamzas

Recent developments in three-dimensional technologies and measurement instrumentation combined with multimedia databases offer today new possibilities for the integrated and complete description of Cultural Heritage Objects (CHO). In this work, we present an attempt to develop a database for archaeological ceramic and glass artifacts, where in addition to digitized two-dimensional images and th...

2009
Sylvain Arlot Gilles Blanchard Etienne Roquain

In the context of correlated multiple tests, we aim at controlling non-asymptotically the family-wise error rate (FWER) using resampling-type procedures. We observe repeated realizations of a Gaussian random vector in possibly high dimension and with an unknown covariance matrix, and consider the one and two-sided multiple testing problem for the mean values of its coordinates. We address this ...

Journal: :Psychophysiology 2011
David M Groppe Thomas P Urbach Marta Kutas

Mass univariate analysis is a relatively new approach for the study of ERPs/ERFs. It consists of many statistical tests and one of several powerful corrections for multiple comparisons. Multiple comparison corrections differ in their power and permissiveness. Moreover, some methods are not guaranteed to work or may be overly sensitive to uninteresting deviations from the null hypothesis. Here w...

2011
Shivendra Shivani Anoop Kumar Patel Sushila Kamble Suneeta Agarwal

ABSTRACT This paper proposes a block-wise fragile watermarking scheme based on k-medoids clustering approach. Proposed scheme is effective enough to reconstruct the tampered extensive content of an image. According to the suggested algorithm, first of all image is divided into the blocks and forty eight bits are calculated for each block, which consist of forty five Recovery bits and three Auth...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید