Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,024,000 papers from all fields of science
Search
Sign In
Create Free Account
UMAC
In cryptography, a message authentication code based on universal hashing, or UMAC, is a type of message authentication code (MAC) calculated…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Block cipher mode of operation
Cryptographic nonce
Cryptography
Data integrity
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Conflict of Interest Declaration and Detection System in Heterogeneous Networks
Siyuan Wu
,
Leong Hou U
,
S. Bhowmick
,
Wolfgang Gatterbauer
International Conference on Information and…
2017
Corpus ID: 22384721
Peer review is the most critical process in evaluating an article to be accepted for publication in an academic venue. When…
Expand
2017
2017
Fast Subsequence Search on Time Series Data
Yuhong Li
,
Bo Tang
,
Leong Hou U
,
Man Lung Yiu
,
Zhiguo Gong
International Conference on Extending Database…
2017
Corpus ID: 44329124
20th International Conference on Extending Database Technology, EDBT 2017, Venice, Italy, 21-24 March 2017
2016
2016
Effect of Time on the Adsorption of Methylene Blue , Methyl Orange and Indigo Carmine onto Activated Carbon
J. OcholiO.
2016
Corpus ID: 40386895
The effect of time on the adsorption of methylene blue (MB), methyl orange (MO) and indigo carmine(IG) from aqueous media onto…
Expand
Review
2014
Review
2014
Authentication and Authorisation for Widget-based Applications in a Loosely-coupled Web eLearning Environment
Jean-Noel Colin
,
Minh Tien Hoang
International Conference on Web Information…
2014
Corpus ID: 20549250
In this paper, we discuss the mechanisms used for authentication and authorisation of users in a widget-based web environment…
Expand
2012
2012
A Dynamic Traffic-Aware Duty Cycle Adjustment MAC Protocol for Energy Conserving in Wireless Sensor Networks
Tz-Heng Hsu
,
Tai-hoon Kim
,
Chao-Chun Chen
,
Jyun-Sian Wu
Int. J. Distributed Sens. Networks
2012
Corpus ID: 2096105
Wireless sensors are battery-limited sensing and computing devices. How to prolong the lifetime of wireless sensors becomes an…
Expand
2009
2009
Research on PVT Control Trajectory of Processing Aspheric Optical Parts Based on UMAC
Geng Zhenye
2009
Corpus ID: 63128386
This article discusses structure of control system based on UMAC motion control card, and basic principle of processing aspheric…
Expand
2007
2007
The use of UMAC in the SSH Transport Layer Protocol
Unrecognized
2007
Corpus ID: 69677171
This memo describes the use of the UMAC Message Authentication Code in the SSH transport protocol.
2005
2005
UMAC worldwide database
Cornelia Weber
,
Marta C. Lourenço
2005
Corpus ID: 115725533
A web-based database has been developed in support of UMAC's mission. The database aims at providing a global directory of…
Expand
2004
2004
A novel design of IEEE 802.15.3 MAC over UWB
Yu Cai
,
Zihua Guo
,
R. Yao
IEEE 60th Vehicular Technology Conference, . VTC…
2004
Corpus ID: 30614094
In this paper, we introduce a novel design for the medium access control (MAC) layer of IEEE 802.15.3, which is defined for a…
Expand
2001
2001
NESSIE Document NES/DOC/SAG/WP3/038/1 † The Statistical Evaluation of the NESSIE Submission UMAC
Stefan Pyka
2001
Corpus ID: 62054755
The purpose of this document is to give a statistical evaluation of the NESSIE submission UMAC, a message authentication code…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE