Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- articleOctober 2013
Reverse Authentication in Financial Transactions and Identity Management
Mobile Networks and Applications (MNET), Volume 18, Issue 5Pages 712–727https://doi.org/10.1007/s11036-012-0366-2New families of protocol, based on communication over human-based side channels, permit secure pairing or group formation in ways such that no party has to prove its name. Rather, individuals are able to hook up devices in their possession to others ...
- ArticleJune 2011
Improving the message expansion of the tangle hash function
Tangle is an iterative one-way hash function based on the Merkle-Damgard scheme strengthened by a message dependent round function. Itwas submitted to the NIST SHA-3 competition, being accepted for first round evaluation. We propose an alternative ...
- abstractMay 2011
Generalizing email messages digests
CHI EA '11: CHI '11 Extended Abstracts on Human Factors in Computing SystemsPages 1933–1938https://doi.org/10.1145/1979742.1979848An email digest is a message that results from the combination of other messages. Mailing list management systems implement digests to let subscribers reduce their email messages frequency. In this paper we address the issue of generalizing this digest ...
- short-paperOctober 2010
Digesting omni-video along routes for navigation
MM '10: Proceedings of the 18th ACM international conference on MultimediaPages 647–650https://doi.org/10.1145/1873951.1874042Omni-directional video records complete visual information along a route. Though replaying an omni-video presents reality, it requires significant amount of memory and communication bandwidth. This work extracts distinct views from an omni-video to form ...
- rfcJune 2010
RFC 5925: The TCP Authentication Option
This document specifies the TCP Authentication Option (TCP-AO), which obsoletes the TCP MD5 Signature option of RFC 2385 (TCP MD5). TCP-AO specifies the use of stronger Message Authentication Codes (MACs), protects against replays even for long-lived TCP ...
- ArticleJuly 2009
On a Construction of Short Digests for Authenticating Ad Hoc Networks
ICCSA '09: Proceedings of the International Conference on Computational Science and Its Applications: Part IIPages 863–876https://doi.org/10.1007/978-3-642-02457-3_70In pervasive ad-hoc networks, there is a need for devices to be able to communicate securely, despite the lack of apriori shared security associations and the absence of an infrastructure such as a PKI. Previous work has shown that through the use of ...
- ArticleDecember 2008
Baseball Digest Production System Using Inductive Logic Programming
ISM '08: Proceedings of the 2008 Tenth IEEE International Symposium on MultimediaPages 503–508https://doi.org/10.1109/ISM.2008.94Here, we propose a technique to acquire knowledge for baseball digest video production using an inductive inference approach. We integrated the concept of inductive logic programming (ILP) and baseball game metadata to enable learning of the highlight ...
- ArticleJuly 2007
A video digest and delivery system: "ChocoParaTV"
This paper proposes a new video digest and delivery system, "ChocoParaTV", for applications such as blogs that include video content, and CGM sites. The video digests are generated based on automatic extraction of emphasized speech portions. To deliver ...
- rfcMay 2006
RFC 4490: Using the GOST 28147-89, GOST R 34.11-94, GOST R 34.10-94, and GOST R 34.10-2001 Algorithms with Cryptographic Message Syntax (CMS)
This document describes the conventions for using the cryptographic algorithms GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94 with the Cryptographic Message Syntax (CMS). The CMS is used for digital signature, digest, ...
- rfcJanuary 2006
RFC 4357: Additional Cryptographic Algorithms for Use with GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94 Algorithms
This document describes the cryptographic algorithms and parameters supplementary to the original GOST specifications, GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94, for use in Internet applications. This memo provides ...
- ArticleNovember 2005
Generation of views of TV content using TV viewers' perspectives expressed in live chats on the web
MULTIMEDIA '05: Proceedings of the 13th annual ACM international conference on MultimediaPages 853–861https://doi.org/10.1145/1101149.1101336We propose a method of generating views of TV programs based on viewer's perspectives expressed in live chats on the Web. Important scenes in a program and responses by particular viewers can be extracted efficiently by statistically computing and/or ...
- ArticleMay 2005
Personal TV viewing by using live chat as metadata
WWW '05: Special interest tracks and posters of the 14th international conference on World Wide WebPages 948–949https://doi.org/10.1145/1062745.1062812We propose a new TV viewing method by personalizing TV programs with live chat information on the Web. It enables a new way of viewing TV content from different perspectives reflecting viewers' viewpoints.
- articleOctober 2002
A remote user authentication scheme using hash functions
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 36, Issue 4Pages 23–29https://doi.org/10.1145/583800.583803Recently, Peyravian and Zunic proposed a simple but efficient password authentication system. Their scheme is based on the collision-resistant hash function, such as SHA-1. Their scheme did not use any cryptosystems (such as DES, RSA, etc.). However, ...