2011
DOI: 10.1007/978-94-007-2598-0_66
|View full text |Cite
|
Sign up to set email alerts
|

Facsimile Authentication Based on MAC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…This scheme can prevent birthday and exhaustive key search attacks, as discussed in the security analysis of the paper. In 2012, Chaisri et al [28] proposed the concept of utilizing MD5 and DES to protect the document integrity of a fax. DES is used to encrypt and maintain the MD5 value.…”
Section: B Lightweight Solutions Based On Keyed Macmentioning
confidence: 99%
See 1 more Smart Citation
“…This scheme can prevent birthday and exhaustive key search attacks, as discussed in the security analysis of the paper. In 2012, Chaisri et al [28] proposed the concept of utilizing MD5 and DES to protect the document integrity of a fax. DES is used to encrypt and maintain the MD5 value.…”
Section: B Lightweight Solutions Based On Keyed Macmentioning
confidence: 99%
“…DISCUSSION: The limitations of existing works [25], [26], [27], [28], [29], [30], [31], [32] can be viewed from different aspects. First, most of these solutions suffer from a computational overhead that is not supported by smart device resources with respect to performing ECC in the data delivery function.…”
Section: B Lightweight Solutions Based On Keyed Macmentioning
confidence: 99%
“…Although, their experiment showed that their proposed method was strong for machine authentication of printed and security document, their method lacked an authenticity checking for electronic document which was sent via Internet. In 2011, C. Chaisri et al [3], proposed the method of authentication and integrity for fax document using Message Authentication Code (MAC). They generated the MAC value from the content of fax document by using MAC algorithm together with secret key and added it into fax document before sending.…”
Section: Introductionmentioning
confidence: 99%
“…In 2012, Chaisri et al [8] proposed the concept of maintaining the integrity of a faxed document. They suggested a scheme to protect the integrity of a faxed document by using data encryption standard (DES) to encrypt and protect the hashed value MAC-MD5.…”
Section: Introductionmentioning
confidence: 99%