Sciweavers

64 search results - page 13 / 13
» Identity-Based Encryption for Sensor Networks
Sort
View
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 4 months ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak
OZCHI
2006
ACM
13 years 10 months ago
A wearable folding display for self-expression
This paper proposes the design rationale of a wearable display that is able to convey the behavioral typology of its wearers by merging insights from wearable computing, aesthetic...
Andrew Vande Moere, Monika Hoinkis
ALGOSENSORS
2010
Springer
13 years 3 months ago
From Key Predistribution to Key Redistribution
One of crucial disadvantages of key predistribution schemes for ad hoc networks is that if devices A and B use a shared key K to determine their session keys, then any adversarial...
Jacek Cichon, Zbigniew Golebiewski, Miroslaw Kutyl...
SASN
2005
ACM
13 years 10 months ago
Key distribution and update for secure inter-group multicast communication
Group communication has become an important component in wireless networks. In this paper, we focus on the environments in which multiple groups coexist in the system, and both in...
Weichao Wang, Bharat K. Bhargava