Sciweavers

104 search results - page 8 / 21
» A secret sharing scheme based on cellular automata
Sort
View
PODC
2010
ACM
14 years 10 months ago
Brief announcement: swarming secrets
We present information-theoretically secure schemes for sharing and modifying secrets among a dynamic swarm of computing devices. The schemes support an unlimited number of change...
Shlomi Dolev, Juan A. Garay, Niv Gilboa, Vladimir ...
SRDS
1998
IEEE
15 years 2 months ago
An Efficient Scheme to Reduce Handoff Dropping in LEO Satellite Systems
The problem of handoffs in cellular networks is compounded in a low earth orbit (LEO) satellite-based cellular network due to the relative motion of the satellites with respect to ...
Suresh Kalyanasundaram, Edwin K. P. Chong, Ness B....
AINA
2004
IEEE
15 years 1 months ago
Supervising Secret-Key Agreements in a Level-Based Hierarchy
A key agreement protocol is utilized in a network system such that two users are able to establish a commonly shared secret key. Entities within the same security level can commun...
Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang
GECCO
2003
Springer
128views Optimization» more  GECCO 2003»
15 years 3 months ago
Cellular Programming and Symmetric Key Cryptography Systems
Abstract. The problem of designing symmetric key cryptography algorithms based upon cellular automata (CAs) is considered. The reliability of the Vernam cipher used in the process ...
Franciszek Seredynski, Pascal Bouvry, Albert Y. Zo...
VLSID
2003
IEEE
208views VLSI» more  VLSID 2003»
15 years 3 months ago
Cryptosystem Designed for Embedded System Security
— This paper reports a cryptosystem designed for security of embedded systems. It is based on the theory of Cellular Automata(CA). The Cellular Automata based Cryptosystem(CAC) e...
Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Di...