Sciweavers

4820 search results - page 192 / 964
» Implementing Signatures for C
Sort
View
JCS
2010
121views more  JCS 2010»
15 years 1 months ago
Computational soundness of symbolic zero-knowledge proofs
raction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently significa...
Michael Backes, Dominique Unruh
PERCOM
2010
ACM
15 years 1 months ago
An integrated system for secure code distribution in Wireless Sensor Networks
—This paper presents a Secure Code Update (SCU) system for Wireless Sensor Networks (WSNs). This solution achieves different security goals. First, through a dedicated authentica...
Nicola Bui, Osman Ugus, Moreno Dissegna, Michele R...
WAIFI
2010
Springer
158views Mathematics» more  WAIFI 2010»
15 years 1 months ago
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
Abstract. We focus on the implementation and security aspects of cryptographic protocols that use Type 1 and Type 4 pairings. On the implementation front, we report improved timing...
Sanjit Chatterjee, Darrel Hankerson, Alfred Meneze...
114
Voted
ISBI
2006
IEEE
16 years 4 months ago
Pattern recognition approaches to compute image similarities: application to age related morphological change
We are studying the genetic influence on rates of age related muscle degeneration in C. elegans. For this, we built pattern recognition tools to calculate a morphological score gi...
Nikita Orlov, Josiah Johnston, Tomasz J. Macura, C...
MOBIHOC
2007
ACM
16 years 2 months ago
Secure incentives for commercial ad dissemination in vehicular networks
Vehicular ad hoc networks (VANETs) are envisioned to provide us with numerous interesting services in the near future. One of the most promising applications is the dissemination ...
Suk-Bok Lee, Gabriel Pan, Joon-Sang Park, Mario Ge...