Sciweavers

24188 search results - page 372 / 4838
» Computing on Encrypted Data
Sort
View
114
Voted
ICCCN
2008
IEEE
15 years 11 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
127
Voted
IEEEIAS
2008
IEEE
15 years 11 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
PIMRC
2008
IEEE
15 years 11 months ago
A key loss recovery scheme for secure broadcasts in wireless sensor networks
Abstract—Authenticity and secrecy of broadcast message content is important in wireless sensor networks deployed for battlefield control, emergency response, and natural resourc...
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...
VTC
2008
IEEE
129views Communications» more  VTC 2008»
15 years 11 months ago
On Parallelizing the CryptMT Stream Cipher
Abstract—Fast stream ciphers are used extensively for encrypted data transmission in mobile networks and over multigigabit links. CryptMT, a recently proposed stream cipher, is o...
Deian Stefan, David B. Nummey, Jared Harwayne-Gida...
ICMB
2006
IEEE
102views Business» more  ICMB 2006»
15 years 10 months ago
Card-based Macropayment for Mobile Phones
Most new entrants into the mobile commerce marketplace are faced with a paradox; how can we attract users without merchants, and how can we attract merchants without customers? Wi...
Philip Garner, Reuben Edwards, Paul Coulton