Sciweavers

1166 search results - page 141 / 234
» Adaptively Secure Broadcast
Sort
View
PKC
2009
Springer
116views Cryptology» more  PKC 2009»
16 years 1 months ago
Improving the Boneh-Franklin Traitor Tracing Scheme
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
ACISP
2005
Springer
15 years 6 months ago
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management
Abstract. RFID tags are tiny, inexpensive, inductively powered computers that are going to replace bar codes on many products, but which have many other uses as well. For example, ...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
IACR
2011
124views more  IACR 2011»
14 years 7 days ago
Efficient Multicast Key Distribution Using HOWF-based Access Control Structures
— Both broadcast encryption (BE) protocols and multicast key distribution (MKD) protocols try to solve the same problem of private group communication. For the first time, we dis...
Jing Liu, Qiong Huang, Bo Yang
JPDC
2007
117views more  JPDC 2007»
15 years 15 days ago
Adversarial exploits of end-systems adaptation dynamics
Internet end-systems employ various adaptation mechanisms that enable them to respond adequately to legitimate requests in overload situations. Today, these mechanisms are incorpo...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
FLAIRS
2004
15 years 2 months ago
Finding Partners to Form Information Sharing Networks in Open Multi-Agent Systems
Information quality assurance despite the existence of uncertainty about sources can be investigated in the context of soft security where an agent maintains trustworthiness evalu...
K. Suzanne Barber, Jisun Park