892 resultados para message authentication code
Resumo:
(Résumé de l'ouvrage) Das Deuteronomium nimmt sowohl in der Literaturgeschichte der alttestamentlichen Geschichtsbücher Josua bis Könige eine Schlüsselstellung ein als auch für die Entstehung des Pentateuchs. Wie lassen sich diese beiden Funktionen vereinbaren? Mit der Verhältnisbestimmung haben sich namhafte Wissenschafter der Arbeitsgruppe »Biblical and Ancient Near Eastern Law« im Rahmen der Internationalen Treffen der Society of Biblical Literature in Berlin (2002) und Cambridge (2003) befasst. Der Band präsentiert die neuesten Forschungsergebnisse. Er enthält Vorträge von E. Otto, K. Schmid, H.-C. Schmitt, T. Römer, W.M. Schniedewind, G.N. Knoppers, R. Achenbach, M.M. Zahn und C. Nihan.
Resumo:
El proyecto Internal Message consiste en el desarrollo de un sistema de mensajería interna que comunique de forma fiable y segura a los usuarios de cualquier sistema de gestión de contenidos Joomla.
Resumo:
Collection : Collection des lois civiles et criminelles des Etats modernes ; 1ère livraison
Resumo:
Collection : Collection des lois civiles et criminelles des états modernes ; 2e livraison
Resumo:
This paper presents the design and implementation of QRP, an open source proof-of-concept authentication system that uses a two-factorauthentication by combining a password and a camera-equipped mobile phone, acting as an authentication token. QRP is extremely secure asall the sensitive information stored and transmitted is encrypted, but it isalso an easy to use and cost-efficient solution. QRP is portable and can be used securely in untrusted computers. Finally, QRP is able to successfully authenticate even when the phone is offline.
Real-Time implementation of a blind authentication method using self-synchronous speech watermarking
Resumo:
A blind speech watermarking scheme that meets hard real-time deadlines is presented and implemented. In addition, one of the key issues in these block-oriented watermarking techniques is to preserve the synchronization. Namely, to recover the exact position of each block in the mark extract process. In fact, the presented scheme can be split up into two distinguished parts, the synchronization and the information mark methods. The former is embedded into the time domain and it is fast enough to be run meeting real-time requirements. The latter contains the authentication information and it is embedded into the wavelet domain. The synchronization and information mark techniques are both tunable in order to allow a con gurable method. Thus, capacity, transparency and robustness can be con gured depending on the needs. It makes the scheme useful for professional applications, such telephony authentication or even sending information throw radio applications.