Sciweavers

20175 search results - page 132 / 4035
» Is abstraction the key to computing
Sort
View
111
Voted
DCC
2010
IEEE
15 years 26 days ago
Anonymity in shared symmetric key primitives
We provide a stronger definition of anonymity in the context of shared symmetric key primitives, and show that existing schemes do not provide this level of anonymity. A new schem...
Gregory M. Zaverucha, Douglas R. Stinson
COMCOM
2011
14 years 7 months ago
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between ...
Leonardo B. Oliveira, Diego F. Aranha, Conrado Por...
83
Voted
BIRTHDAY
2008
Springer
15 years 2 months ago
Observability Concepts in Abstract Data Type Specification, 30 Years Later
ility concepts in abstract data type specification, 30 years later Donald Sannella1 and Andrzej Tarlecki2,3 1 Laboratory for Foundations of Computer Science, University of Edinburg...
Donald Sannella, Andrzej Tarlecki
178
Voted
NDSS
1997
IEEE
15 years 5 months ago
Distributed Authentication in Kerberos Using Public Key Cryptography
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authenticati...
Marvin A. Sirbu, John C.-I. Chuang
ENTCS
2007
145views more  ENTCS 2007»
15 years 17 days ago
Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks
Wireless sensor networks are comprised of a vast number of ultra-small autonomous computing, communication and sensing devices, with restricted energy and computing capabilities, ...
Ioannis Chatzigiannakis, Elisavet Konstantinou, Va...