Sciweavers

1286 search results - page 124 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
119
Voted
SCN
2010
Springer
144views Communications» more  SCN 2010»
14 years 11 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng
INFOCOM
2011
IEEE
14 years 4 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
IPPS
1998
IEEE
15 years 5 months ago
Performance Prediction in Production Environments
Accurate performance predictions are difficult to achieve for parallel applications executing on production distributed systems. Conventional point-valued performance parameters a...
Jennifer M. Schopf, Francine Berman
84
Voted
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
14 years 10 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
MSWIM
2004
ACM
15 years 6 months ago
Mobile dynamic content distribution networks
Mobile networks are becoming increasingly popular as a means for distributing information to a large number of users. In comparison to wired networks, mobile networks are distingu...
Wagner Moro Aioffi, Geraldo Robson Mateus, Jussara...