Information Security Applications

Information Security Applications

4.11 - 1251 ratings - Source

Nevertheless our scheme works in such a way that a receiver only needs to get enough packets from a block before verifying it (he does not have to wait for the whole sequence). As the previous scheme, it will be joinable at any block boundary. We need a collision-resistant hash function h as well as a signature scheme (KeyGen, sign, verify) where KeyGen generates the private key SK and its anbsp;...

Title:Information Security Applications
Author:Jooseok Song, Taekyoung Kwon
Publisher:Springer - 2006-02-02


You Must CONTINUE and create a free account to access unlimited downloads & streaming