Sciweavers

1825 search results - page 51 / 365
» Cryptographic Securities Exchanges
Sort
View
116
Voted
ICCSA
2007
Springer
15 years 9 months ago
Provably Secure Framework for Information Aggregation in Sensor Networks
Information aggregation is an important operation in wireless sensor networks executed for the purpose of monitoring and reporting of the environmental data. Due to the performance...
Mark Manulis, Jörg Schwenk
139
Voted
LCN
2006
IEEE
15 years 9 months ago
Practical Evaluation of the Performance Impact of Security Mechanisms in Sensor Networks
Security has become a major concern for many realworld applications for wireless sensor networks (WSN). In this domain, many security solutions have been proposed. Usually, all th...
Martin Passing, Falko Dressler
122
Voted
IMA
2005
Springer
85views Cryptology» more  IMA 2005»
15 years 9 months ago
The Physically Observable Security of Signature Schemes
In recent years much research has been devoted to producing formal models of security for cryptographic primitives and to designing schemes that can be proved secure in such models...
Alexander W. Dent, John Malone-Lee
127
Voted
ICON
2007
IEEE
15 years 9 months ago
A Study of the TKIP Cryptographic DoS Attack
—Wireless networks, especially those based on 802.11, have found widespread use in domestic, commercial, educational, military and public-safety environments. The security of the...
Stephen Mark Glass, Vallipuram Muthukkumarasamy
112
Voted
INDOCRYPT
2004
Springer
15 years 8 months ago
On Boolean Functions with Generalized Cryptographic Properties
By considering a new metric, we generalize cryptographic properties of Boolean functions such as resiliency and propagation characteristics. These new definitions result in a bett...
An Braeken, Ventzislav Nikov, Svetla Nikova, Bart ...