Sciweavers

1166 search results - page 89 / 234
» Adaptively Secure Broadcast
Sort
View
ICC
2007
IEEE
245views Communications» more  ICC 2007»
15 years 7 months ago
A Node Recovery Scheme for Data Dissemination in Wireless Sensor Networks
—In wireless sensor networks, sensor nodes are expected to gather specific information about the environment and send it to the user. The data dissemination usually involves many...
Faycal Bouhafs, Madjid Merabti, Hala M. Mokhtar
87
Voted
ICCSA
2005
Springer
15 years 6 months ago
Data Protection Based on Physical Separation: Concepts and Application Scenarios
Data protection is an increasingly important issue in today’s communication networks. Traditional solutions for protecting data when transferred over a network are almost exclusi...
Stefan Lindskog, Karl-Johan Grinnemo, Anna Brunstr...
76
Voted
ISCC
2003
IEEE
101views Communications» more  ISCC 2003»
15 years 5 months ago
A New Self-Healing Key Distribution Scheme
A self-healing key distributionscheme enables a group of users to establish a group key over an unreliable channel. In such a protocol, a group manager, to distributea session key...
Carlo Blundo, Paolo D'Arco, Massimiliano Listo
97
Voted
FC
2010
Springer
163views Cryptology» more  FC 2010»
15 years 4 months ago
A Traceability Attack against e-Passports
Since 2004, many nations have started issuing “e-passports” containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secur...
Tom Chothia, Vitaliy Smirnov
123
Voted
IJNSEC
2007
107views more  IJNSEC 2007»
15 years 16 days ago
A Traitor Tracing Scheme Based on the RSA System
Traitor tracing schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, the data-suppliers ca...
Bo Yang, Hua Ma, Shenglin Zhu