Sciweavers

20175 search results - page 135 / 4035
» Is abstraction the key to computing
Sort
View
110
Voted
PERVASIVE
2004
Springer
15 years 6 months ago
A Fault-Tolerant Key-Distribution Scheme for Securing Wireless Ad Hoc Networks
We propose a novel solution for securing wireless ad-hoc networks. Our goal is to provide secure key exchange in the presence of device failures and denial-of-service attacks. The ...
Arno Wacker, Timo Heiber, Holger Cermann, Pedro Jo...
94
Voted
ACL
2009
14 years 10 months ago
Reducing SMT Rule Table with Monolingual Key Phrase
This paper presents an effective approach to discard most entries of the rule table for statistical machine translation. The rule table is filtered by monolingual key phrases, whi...
Zhongjun He, Yao Meng, Yajuan Lü, Hao Yu, Qun...
CRYPTO
2003
Springer
137views Cryptology» more  CRYPTO 2003»
15 years 6 months ago
New Partial Key Exposure Attacks on RSA
Abstract. In 1998, Boneh, Durfee and Frankel [4] presented several attacks on RSA when an adversary knows a fraction of the secret key bits. The motivation for these so-called part...
Johannes Blömer, Alexander May
112
Voted
FGCS
2007
90views more  FGCS 2007»
15 years 22 days ago
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
Grid computing is a newly developed technology for complex systems with large-scale resource sharing and multi-institutional collaboration. The prominent feature of grid computing...
Xukai Zou, Yuan-Shun Dai, Xiang Ran
ASIACRYPT
2009
Springer
15 years 7 months ago
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
Abstract. We describe a public-key encryption scheme based on lattices — specifically, based on the hardness of the learning with error (LWE) problem — that is secure against ...
Jonathan Katz, Vinod Vaikuntanathan