Skip to main content

and
Your search also matched 5 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Preventing Secret Data Leakage from Foreign Map**s in Virtual Machines

Include preview-only content
  1. Chapter and Conference Paper

    An Improved Poly1305 MAC

    In this paper, we propose an improved Poly1305 MAC, called IPMAC. IPMAC is a refinement of Poly1305 MAC shown by Bernstein. We use only one 16-byte key and one 16-byte nonce for IPMAC while Poly1305 MAC uses t...

    Dayin Wang, Dongdai Lin, Wenling Wu in Applied Cryptography and Network Security (2006)

  2. Chapter and Conference Paper

    Real Perfect Contrast Visual Secret Sharing Schemes with Reversing

    The visual secret sharing (VSS for short) scheme is a secret image sharing scheme. A secret image is visually revealed from overlap** shadow images without additional computations. However, the contrast of r...

    Ching-Nung Yang, Chung-Chun Wang in Applied Cryptography and Network Security (2006)

  3. Chapter and Conference Paper

    Adaptive Detection of Local Scanners

    Network attacks often employ scanning to locate vulnerable hosts and services. Fast and accurate detection of local scanners is key to containing an epidemic in its early stage. Existing scan detection schemes...

    Ahren Studer, Chenxi Wang in Applied Cryptography and Network Security (2006)

  4. Chapter and Conference Paper

    Building Reliable Mix Networks with Fair Exchange

    In this paper we present techniques by which each mix in a mix network can be paid for its services by message senders, in a way that ensures fairness and without sacrificing anonymity. We describe a payment m...

    Michael K. Reiter, **aoFeng Wang in Applied Cryptography and Network Security (2005)

  5. Chapter and Conference Paper

    Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks

    Passwords are one of the most common cause of system break-ins, because the low entropy of passwords makes systems vulnerable to brute force guessing attacks (dictionary attacks). Existing Strong Password-base...

    Peng Wang, Yongdae Kim, Vishal Kher in Applied Cryptography and Network Security (2005)

  6. Chapter and Conference Paper

    Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords

    A password-authenticated key exchange scheme allows two entities, who only share a memorable password, to authenticate each other and to agree on a cryptographic session key. Instead of considering it in the c...

    Shuhong Wang, Jie Wang, Maozhi Xu in Applied Cryptography and Network Security (2004)

  7. Chapter and Conference Paper

    Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks

    Multiple-time signatures are digital signature schemes where the signer is able to sign a predetermined number of messages. They are interesting cryptographic primitives because they allow to solve many import...

    Josef Pieprzyk, Huaxiong Wang, Selected Areas in Cryptography (2004)