Sciweavers

319 search results - page 31 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
INFOCOM
2010
IEEE
14 years 8 months ago
Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks
—Neighbor discovery is a fundamental requirement and need be done frequently in underwater acoustic networks (UANs) with floating node mobility. In hostile environments, neighbo...
Rui Zhang, Yanchao Zhang
TIT
2011
125views more  TIT 2011»
14 years 4 months ago
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
Abstract. In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called proxy re-encryption, in which a proxy transforms – without seeing the corresponding plain...
Benoît Libert, Damien Vergnaud
SEMWEB
2009
Springer
15 years 4 months ago
Uncertainty Reasoning for Linked Data
Linked open data offers a set of design patterns and conventions for sharing data across the semantic web. In this position paper we enumerate some key uncertainty representation i...
Dave Reynolds
GI
2005
Springer
15 years 3 months ago
On-demand Construction of Non-interfering Multiple Paths in Wireless Sensor Networks
: In this paper we present a routing scheme for on-demand construction of multiple non-interfering paths in wireless sensor networks. One usage of this multipath scheme is to provi...
Thiemo Voigt, Adam Dunkels, Torsten Braun
CRYPTO
1992
Springer
154views Cryptology» more  CRYPTO 1992»
15 years 1 months ago
Massively Parallel Computation of Discrete Logarithms
Numerous cryptosystems have been designed to be secure under the assumption that the computation of discrete logarithms is infeasible. This paper reports on an aggressive attempt ...
Daniel M. Gordon, Kevin S. McCurley