Sciweavers

380 search results - page 53 / 76
» Intrusion-Resilient Secret Sharing
Sort
View
113
Voted
CCR
2006
76views more  CCR 2006»
15 years 1 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
109
Voted
ESAS
2007
Springer
15 years 8 months ago
Multiple Target Localisation in Sensor Networks with Location Privacy
Abstract. It is now well known that data-fusion from multiple sensors can improve detection and localisation of targets. Traditional data fusion requires the sharing of detailed da...
Matthew Roughan, Jon Arnold
EUROCRYPT
2009
Springer
16 years 2 months ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...
IWSEC
2009
Springer
15 years 8 months ago
ID-Based Group Password-Authenticated Key Exchange
Abstract—Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication is a human-memorable password. In this pa...
Xun Yi, Raylin Tso, Eiji Okamoto
136
Voted
EUROCRYPT
2004
Springer
15 years 7 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer