Sciweavers

2028 search results - page 11 / 406
» Deriving Relation Keys from XML Keys
Sort
View
ICC
2009
IEEE
130views Communications» more  ICC 2009»
14 years 9 months ago
Verification of Secret Key Generation from UWB Channel Observations
Theoretical models of ultrawideband (UWB) radio channels indicate that pairs of UWB radio transceivers measure their common radio channel with a high degree of agreement and third ...
Masoud Ghoreishi Madiseh, Shuai He, Michael L. McG...
DSN
2007
IEEE
15 years 6 months ago
Protecting Cryptographic Keys from Memory Disclosure Attacks
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that ...
Keith Harrison, Shouhuai Xu
DCC
2008
IEEE
15 years 11 months ago
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
LaMacchia, Lauter and Mityagin recently presented a strong security definition for authenticated key agreement strengthening the well-known Canetti-Krawczyk definition. They also ...
Berkant Ustaoglu
EUROCRYPT
2009
Springer
16 years 6 days ago
Key Agreement from Close Secrets over Unsecured Channels
We consider information-theoretic key agreement between two parties sharing somewhat different versions of a secret w that has relatively little entropy. Such key agreement, also ...
Bhavana Kanukurthi, Leonid Reyzin
DAGSTUHL
2011
13 years 11 months ago
Comparative Visualization Using Cross-Mesh Field Evaluations and Derived Quantities
We present a data-level comparative visualization system that utilizes two key pieces of technology: (1) cross-mesh field evaluation – algorithms to evaluate a field from one ...
Hank Childs, Sean Ahern, Jeremy S. Meredith, Mark ...