Sciweavers

631 search results - page 2 / 127
» Intrusion-Resilient Secure Channels
Sort
View
CISC
2006
Springer
131views Cryptology» more  CISC 2006»
13 years 9 months ago
Efficient Intrusion-Resilient Signatures Without Random Oracles
Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forward-secure and key-insulated signatures. As in the latter schemes, time is divided into di...
Benoît Libert, Jean-Jacques Quisquater, Moti...
IJSN
2006
123views more  IJSN 2006»
13 years 5 months ago
A survey of key evolving cryptosystems
: This paper presents a survey of key evolving cryptosystems in the public key setting, focusing on two main approaches: `forward security' and `intrusion resilience'. Th...
Matthew K. Franklin
IFIP
2009
Springer
13 years 3 months ago
Specification and Verification of Side Channel Declassification
Side channel attacks have emerged as a serious threat to the security of both networked and embedded systems
Josef Svenningsson, David Sands
ICASSP
2011
IEEE
12 years 9 months ago
Secrecy capacity and secure outage performance for rayleigh fading simo channel
In this paper, we consider the problem of secret communication through Rayleigh fading single-input multiple-output (SIMO) broadcast channel in the presence of an eavesdropper. At...
Md. Zahurul I. Sarkar, Tharmalingam Ratnarajah
ISITA
2010
13 years 10 days ago
On attainment of the capacity of broadband quantum channel by wavelength division multiplexing
Recently, the exact solution of the capacity of an attenuated quantum channel which is a model of a long distance optical fiber channel was derived [V. Giovannetti, et al., Phys. R...
Yoshio Takamura, Shogo Usami, Tsuyoshi Sasaki Usud...