Sciweavers

1166 search results - page 62 / 234
» Adaptively Secure Broadcast
Sort
View
JCIT
2008
130views more  JCIT 2008»
15 years 16 days ago
Group-oriented Encryption Secure against Collude Attack
A group oriented encryption scheme is presented in this paper. In this scheme, a sender is allowed to encrypt a message using the group public key and send the ciphertext to the gr...
Chunbo Ma, Jun Ao
92
Voted
ACISP
2003
Springer
15 years 5 months ago
On the Pseudorandomness of KASUMI Type Permutations
KASUMI is a block cipher which has been adopted as a standard of 3GPP. In this paper, we study the pseudorandomness of idealized KASUMI type permutations for adaptive adversaries. ...
Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa
PEWASUN
2005
ACM
15 years 6 months ago
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks
Inherent to the wireless sensor networks are the two major problems of the broadcasting vulnerability, the limited computational capability and power budget. Even though security ...
Hamdy S. Soliman, Mohammed Omari
81
Voted
CAISE
2003
Springer
15 years 5 months ago
Designing Ubiquitous Personalized TV-Anytime Services
In this paper we present the design of an environment that offers personalized, ubiquitous information services in the emerging integrated world of the digital-TV and the Internet....
Fotis G. Kazasis, Nektarios Moumoutzis, Nikos Papp...
WINET
2002
128views more  WINET 2002»
15 years 5 days ago
Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks
In this paper, we present a family of adaptive protocols, called SPIN (Sensor Protocols for Information via Negotiation), that efficiently disseminate information among sensors in ...
Joanna Kulik, Wendi Rabiner Heinzelman, Hari Balak...