Sciweavers

126 search results - page 24 / 26
» Public Key Cryptography in Sensor Networks - Revisited
Sort
View
ICC
2007
IEEE
186views Communications» more  ICC 2007»
13 years 12 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
WISEC
2009
ACM
14 years 12 days ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
VRML
1998
ACM
13 years 9 months ago
Visualization Products On-Demand Through the Web
We describe our efforts in providing REINAS (Realtime Environmental Information Network and Analysis System) weather visualization products on demand through the web. As the REINA...
Suzana Djurcilov, Alex Pang
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 5 months ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak
ACSAC
2005
IEEE
13 years 11 months ago
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Sara Sinclair, Sean W. Smith