Sciweavers

2108 search results - page 120 / 422
» Encrypted
Sort
View
PE
2002
Springer
158views Optimization» more  PE 2002»
15 years 3 months ago
Comparison of inter-area rekeying algorithms for secure wireless group communications
Many emerging mobile wireless applications depend upon secure group communications, in which data is encrypted and the group's data encryption key is changed whenever a membe...
Chun Zhang, Brian DeCleene, James F. Kurose, Donal...
105
Voted
EUROCRYPT
2009
Springer
16 years 3 months ago
A New Randomness Extraction Paradigm for Hybrid Encryption
Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti...
VLSID
2006
IEEE
144views VLSI» more  VLSID 2006»
16 years 3 months ago
A High-Performance VLSI Architecture for Advanced Encryption Standard (AES) Algorithm
In this paper we present a high-performance, high throughput, and area efficient architecture for the VLSI implementation of the AES algorithm. The subkeys, required for each round...
Naga M. Kosaraju, Murali R. Varanasi, Saraju P. Mo...
90
Voted
SIGMOD
2002
ACM
111views Database» more  SIGMOD 2002»
16 years 3 months ago
Executing SQL over encrypted data in the database-service-provider model
Balakrishna R. Iyer, Chen Li, Hakan Hacigüm&u...
MOBIHOC
2006
ACM
16 years 2 months ago
Jamming and sensing of encrypted wireless ad hoc networks
Timothy X. Brown, Jesse E. James, Amita Sethi