Sciweavers

20175 search results - page 161 / 4035
» Is abstraction the key to computing
Sort
View
82
Voted
ICDCSW
2006
IEEE
15 years 7 months ago
The Key Knob
Locks are mechanical fastening devices used on various kinds of objects like doors and vehicles, and they can be released using a certain type of key. They have a long history, fr...
Alois Ferscha, Clemens Holzmann, Stefan Resmerita
98
Voted
IJNSEC
2006
110views more  IJNSEC 2006»
15 years 1 months ago
Password-based Encrypted Group Key Agreement
This paper presents an efficient password-based authenticated encrypted group key agreement protocol immune to dictionary attack under the computation Diffie-Hellman (CDH) assumpt...
Ratna Dutta, Rana Barua
111
Voted
ISPDC
2010
IEEE
14 years 11 months ago
SKAIT: A Parameterized Key Assignment Scheme for Wireless Networks
—In this paper, we propose SKAIT, a parameterized symmetric key pre-distribution scheme that guarantees a secure and confidential channel between every pair of nodes in a wirele...
Ramon Novales, Neeraj Mittal, Kamil Saraç
127
Voted
ACMSE
2009
ACM
14 years 11 months ago
A secure unidirectional proxy re-encryption using identity and secret key exchange
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Edna Milgo
105
Voted
ICPR
2008
IEEE
15 years 7 months ago
Automatic video annotation with adaptive number of key words
Retrieving videos using key words requires obtaining the semantic features of the videos. Most work reported in the literature focuses on annotating a video shot with a fixed numb...
Fangshi Wang, Wei Lu, Jingen Liu, Mubarak Shah, De...