Sciweavers

5324 search results - page 688 / 1065
» Internet Security Protocols
Sort
View
133
Voted
SRDS
2008
IEEE
15 years 11 months ago
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
Unattended Wireless Sensor Networks (UWSNs) are composed of many small resource-constrained devices and operate autonomously, gathering data which is periodically collected by a v...
Roberto Di Pietro, Di Ma, Claudio Soriente, Gene T...
DAWAK
2007
Springer
15 years 11 months ago
Computing Join Aggregates over Private Tables
We propose a privacy-preserving protocol for computing aggregation queries over the join of private tables. In this problem, several parties wish to share aggregated information ov...
Rong She, Ke Wang, Ada Wai-Chee Fu, Yabo Xu
127
Voted
FC
2007
Springer
151views Cryptology» more  FC 2007»
15 years 11 months ago
Conditional E-Cash
Abstract. We introduce a novel conditional e-cash protocol allowing future anonymous cashing of bank-issued e-money only upon the satisfaction of an agreed-upon public condition. P...
Larry Shi, Bogdan Carbunar, Radu Sion
FC
2007
Springer
128views Cryptology» more  FC 2007»
15 years 11 months ago
Informant: Detecting Sybils Using Incentives
We propose an economic approach to Sybil attack detection. In our Informant protocol, a detective offers a reward for Sybils to reveal themselves. The detective accepts from one i...
N. Boris Margolin, Brian Neil Levine
FPL
2007
Springer
154views Hardware» more  FPL 2007»
15 years 11 months ago
Physical Unclonable Functions, FPGAs and Public-Key Crypto for IP Protection
In recent years, IP protection of FPGA hardware designs has become a requirement for many IP vendors. To this end solutions have been proposed based on the idea of bitstream encry...
Jorge Guajardo, Sandeep Kumar, Geert Jan Schrijen,...