Sciweavers

2209 search results - page 218 / 442
» Language Based Secure Communication
Sort
View
191
Voted
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
15 years 10 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
15 years 7 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
GECCO
2009
Springer
152views Optimization» more  GECCO 2009»
15 years 10 months ago
Application of evolutionary algorithms in detection of SIP based flooding attacks
The Session Initiation Protocol (SIP) is the de facto standard for user’s session control in the next generation Voice over Internet Protocol (VoIP) networks based on the IP Mul...
M. Ali Akbar, Muddassar Farooq
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 11 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
ENGL
2008
129views more  ENGL 2008»
15 years 4 months ago
The Creation of a Chinese Emotion Ontology Based on HowNet
Full comprehension of language comes about by understanding the meaning and the emotion behind the communication. Understanding the meaning of language is the goal of natural lang...
Jiajun Yan, David B. Bracewell, Fuji Ren, Shingo K...