Sciweavers

11 search results - page 2 / 3
» Receiver anonymity via incomparable public keys
Sort
View
CORR
2011
Springer
224views Education» more  CORR 2011»
13 years 3 days ago
A Broadcast Approach To Secret Key Generation Over Slow Fading Channels
Abstract—A secret-key generation scheme based on a layered broadcasting strategy is introduced for slow-fading channels. In the model considered, Alice wants to share a key with ...
Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, H. ...
ASIACRYPT
2009
Springer
13 years 11 months ago
Group Encryption: Non-interactive Realization in the Standard Model
Group encryption (GE) schemes, introduced at Asiacrypt’07, are an encryption analogue of group signatures with a number of interesting applications. They allow a sender to encryp...
Julien Cathalo, Benoît Libert, Moti Yung
USS
2004
13 years 6 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson
JCM
2007
191views more  JCM 2007»
13 years 5 months ago
Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions
— The use of signal processing techniques to protect wireless transmissions is proposed as a way to secure wireless networks at the physical layer. This approach addresses a uniq...
Xiaohua Li, Juite Hwu, E. Paul Ratazzi
GCC
2003
Springer
13 years 10 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou