Sciweavers

1166 search results - page 64 / 234
» Adaptively Secure Broadcast
Sort
View
112
Voted
SIGOPSE
2004
ACM
15 years 6 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn
106
Voted
EUROCRYPT
2001
Springer
15 years 5 months ago
A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures
Abstract. Known practical blind signature schemes whose security against adaptive and parallel attacks can be proven in the random oracle model either need five data exchanges bet...
Masayuki Abe
113
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
On the Connectivity of Key-Distribution Strategies in Wireless Sensor Networks
Abstract—Wireless sensor networks (WSNs) are usually missioned to gather critical information in hostile and adversarial environments, which make them susceptible to compromise a...
Hosein Shafiei, Ahmad Khonsari, Mohammad Sadegh Ta...
INTERSPEECH
2010
14 years 7 months ago
The RWTH 2009 quaero ASR evaluation system for English and German
In this work, the RWTH automatic speech recognition systems for English and German for the second Quaero evaluation campaign 2009 are presented. The systems are designed to transc...
Markus Nußbaum-Thom, Simon Wiesler, Martin S...
EUROCRYPT
2006
Springer
15 years 4 months ago
Compact Group Signatures Without Random Oracles
We present the first efficient group signature scheme that is provably secure without random oracles. We achieve this result by combining provably secure hierarchical signatures i...
Xavier Boyen, Brent Waters