Sciweavers

1769 search results - page 89 / 354
» Cryptography
Sort
View
AINA
2007
IEEE
15 years 4 months ago
Agri-Food Traceability Management using a RFID System with Privacy Protection
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in f...
Paolo Bernardi, Claudio Demartini, Filippo Gandino...
EUROPKI
2007
Springer
15 years 4 months ago
Applicability of Public Key Infrastructures in Wireless Sensor Networks
Abstract. Wireless Sensor Networks (WSN) are becoming a key technology in the support of pervasive and ubiquitous services. The previous notion of “PKC is too expensive for WSN...
Rodrigo Roman, Cristina Alcaraz
PAIRING
2007
Springer
140views Cryptology» more  PAIRING 2007»
15 years 4 months ago
The Tate Pairing Via Elliptic Nets
We derive a new algorithm for computing the Tate pairing on an elliptic curve over a finite field. The algorithm uses a generalisation of elliptic divisibility sequences known as...
Katherine E. Stange
ESORICS
2004
Springer
15 years 3 months ago
A Public-Key Encryption Scheme with Pseudo-random Ciphertexts
This work presents a practical public-key encryption scheme that offers security under adaptive chosen-ciphertext attack (CCA) and has pseudo-random ciphertexts, i.e. ciphertexts ...
Bodo Möller
BPM
2003
Springer
102views Business» more  BPM 2003»
15 years 3 months ago
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
Peter Lory