Sciweavers

1161 search results - page 115 / 233
» Group Message Authentication
Sort
View
133
Voted
COMCOM
2007
149views more  COMCOM 2007»
15 years 2 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
149
Voted
TIT
2010
130views Education» more  TIT 2010»
14 years 9 months ago
Pseudo-random functions and parallelizable modes of operations of a block cipher
This paper considers the construction and analysis of pseudo-random functions (PRFs) with specific reference to modes of operations of a block cipher. In the context of message aut...
Palash Sarkar
118
Voted
OPODIS
2004
15 years 4 months ago
Sentries and Sleepers in Sensor Networks
A sensor is a battery-operated small computer with an antenna and a sensing board that can sense magnetism, sound, heat, etc. Sensors in a network can use their antennas to communi...
Mohamed G. Gouda, Young-ri Choi, Anish Arora
174
Voted
NDSS
2000
IEEE
15 years 7 months ago
Chameleon Signatures
Abstract. Chameleon signatures simultaneously provide the properties of nonrepudiation and non-transferability for the signed message. However, the initial constructions of chamele...
Hugo Krawczyk, Tal Rabin
99
Voted
ICCCN
2007
IEEE
15 years 9 months ago
A Fast Delivery Protocol for Total Order Broadcasting
Abstract—Sequencer, privilege-based, and communication history algorithms are popular approaches to implement total ordering, where communication history algorithms are most suit...
Li Ou, Xubin He, Christian Engelmann, Stephen L. S...