Sciweavers

126 search results - page 25 / 26
» Public Key Cryptography in Sensor Networks - Revisited
Sort
View
EUROCRYPT
2008
Springer
13 years 6 months ago
Almost-Everywhere Secure Computation
Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it is well known that MPC is possible if and only if the underlying communication network...
Juan A. Garay, Rafail Ostrovsky
MOBISYS
2005
ACM
14 years 4 months ago
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
This paper presents a new pairing protocol that allows two CPU-constrained wireless devices Alice and Bob to establish a shared secret at a very low cost. To our knowledge, this i...
Claude Castelluccia, Pars Mutaf
ARESEC
2011
117views more  ARESEC 2011»
12 years 4 months ago
Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square Roots
—Denial of Service (DoS) attacks aiming to exhaust the resources of a server by overwhelming it with bogus requests have become a serious threat. Especially protocols that rely o...
Yves Igor Jerschow, Martin Mauve
CCS
2007
ACM
13 years 11 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...
MOBIQUITOUS
2008
IEEE
13 years 11 months ago
ScreenSpot resource discovery for smart spaces and mobilevue media sharing application
This paper documents the demonstration showcasing the ScreenSpot resource discovery framework and the MobileVue social media sharing application. The key points of the demonstrati...
Marko Jurmu, Sebastian Boring, Jukka Riekki