Sciweavers

25 search results - page 1 / 5
» iscc 2009
Sort
View
ISCC
2009
IEEE
129views Communications» more  ISCC 2009»
13 years 11 months ago
LWESP: Light-Weight Exterior Sensornet Protocol
Ángel Cuevas, Manuel Urueña, Annett ...
ISCC
2009
IEEE
170views Communications» more  ISCC 2009»
13 years 11 months ago
A directly public verifiable signcryption scheme based on elliptic curves
A directly public verifiable signcryption scheme is introduced in this paper that provides the security attributes of message confidentiality, authentication, integrity, non-repud...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
ISCC
2009
IEEE
149views Communications» more  ISCC 2009»
13 years 11 months ago
A secure variant of the Hill Cipher
The Hill cipher is a classical symmetric encryption algorithm that succumbs to the know-plaintext attack. Although its vulnerability to cryptanalysis has rendered it unusable in p...
Mohsen Toorani, Abolfazl Falahati
ISCC
2009
IEEE
130views Communications» more  ISCC 2009»
13 years 11 months ago
Context-aware publish-subscribe: Model, implementation, and evaluation
Complex communication patterns often need to take into account the situation in which the information to be communicated is produced or consumed. Publish-subscribe, and particular...
Gianpaolo Cugola, Alessandro Margara, Matteo Migli...