Sciweavers

2108 search results - page 45 / 422
» Encrypted
Sort
View
114
Voted
CASES
2003
ACM
15 years 6 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
ACSAC
2002
IEEE
15 years 5 months ago
Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption
The blooming e-commerce is demanding better methods to protect online users' privacy, especially the credit card information that is widely used in online shopping. Holding a...
Donghua Xu, Chenghuai Lu, André L. M. dos S...
CISC
2007
Springer
129views Cryptology» more  CISC 2007»
15 years 4 months ago
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...
Chunxiang Gu, Yuefei Zhu, Heng Pan
PKC
2010
Springer
193views Cryptology» more  PKC 2010»
15 years 4 months ago
Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes
We present a fully homomorphic encryption scheme which has both relatively small key and ciphertext size. Our construction follows that of Gentry by producing a fully homomorphic s...
Nigel P. Smart, Frederik Vercauteren
108
Voted
ICCSA
2007
Springer
15 years 4 months ago
Using Adaptative Encryption for Ubiquitous Environments
One of the most important issues for ubiquitous computing is the problem of encrypting content in the devices, as the heterogeneity in the devices nature, capabilities, mobility an...
Antonio Izquierdo, Joaquín Torres Má...