Sciweavers

20175 search results - page 142 / 4035
» Is abstraction the key to computing
Sort
View
156
Voted
EUC
2008
Springer
15 years 2 months ago
An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications
Password authentication is a popular approach used for user authentication in pervasive computing environments due to its simplicity and convenience. To secure the transmission be...
Maw-Jinn Tsaur, Wei-Chi Ku, Hao-Rung Chung
104
Voted
CLUSTER
2010
IEEE
14 years 10 months ago
Harnessing parallelism in multicore clusters with the All-Pairs, Wavefront, and Makeflow abstractions
All-Pairs, Wavefront, and Makeflow Abstractions Li Yu
Li Yu, Christopher Moretti, Andrew Thrasher, Scott...
84
Voted
ICALP
2005
Springer
15 years 6 months ago
Completely Non-malleable Schemes
Abstract An encryption scheme is non-malleable if the adversary cannot transform a ciphertext into one of a related message under the given public key. Although providing a very st...
Marc Fischlin
111
Voted
CORR
2008
Springer
90views Education» more  CORR 2008»
15 years 27 days ago
A computationally-efficient construction for the matrix-based key distribution in sensor network
Key pre-distribution in wireless sensor network is aimed at delivering keys to sensor networks at the low expense of computation, communication, and memory while providing a high d...
Abedelaziz Mohaisen
97
Voted
IACR
2011
149views more  IACR 2011»
14 years 13 days ago
Public Key Encryption for the Forgetful
We investigate public key encryption that allows the originator of a ciphertext to retrieve a “forgotten” plaintext from the ciphertext. This type of public key encryption wit...
Puwen Wei, Yuliang Zheng, Xiaoyun Wang