Sciweavers

250 search results - page 11 / 50
» Modeling Public Key Infrastructures in the Real World
Sort
View
ISADS
1999
IEEE
15 years 4 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
PERCOM
2007
ACM
15 years 11 months ago
Expressing Sensor Network Interaction Patterns Using Data-Driven Macroprogramming
Wireless Sensor Networks (WSNs) are increasingly being employed as a key building block of pervasive computing infrastructures, owing to their ability to be embedded within the re...
Animesh Pathak, Luca Mottola, Amol Bakshi, Viktor ...
EUROPKI
2008
Springer
15 years 1 months ago
A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System
Real world healthcare systems are generally large and overly complex systems. Designing privacy-friendly protocols for such systems is a challenging task. In this paper we present ...
Bart De Decker, Mohamed Layouni, Hans Vangheluwe, ...
SAG
2004
Springer
15 years 5 months ago
A Generic Architecture for Sensor Data Integration with the Grid
This paper describes the design and implementation of a model of how to integrate sensors and devices into a GRID infrastructure. We describe its proxy-based approach, the port-ty...
Jan Humble, Chris Greenhalgh, Alastair Hampshire, ...
ACNS
2003
Springer
168views Cryptology» more  ACNS 2003»
15 years 5 months ago
PLI: A New Framework to Protect Digital Content for P2P Networks
In this paper, we first propose a novel Public License Infrastructure (PLI) that uses cryptographic threshold secret sharing schemes to provide decentralized public license service...
Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang