Sciweavers

250 search results - page 11 / 50
» Modeling Public Key Infrastructures in the Real World
Sort
View
ISADS
1999
IEEE
15 years 2 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
PERCOM
2007
ACM
15 years 9 months ago
Expressing Sensor Network Interaction Patterns Using Data-Driven Macroprogramming
Wireless Sensor Networks (WSNs) are increasingly being employed as a key building block of pervasive computing infrastructures, owing to their ability to be embedded within the re...
Animesh Pathak, Luca Mottola, Amol Bakshi, Viktor ...
EUROPKI
2008
Springer
14 years 11 months ago
A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System
Real world healthcare systems are generally large and overly complex systems. Designing privacy-friendly protocols for such systems is a challenging task. In this paper we present ...
Bart De Decker, Mohamed Layouni, Hans Vangheluwe, ...
SAG
2004
Springer
15 years 3 months ago
A Generic Architecture for Sensor Data Integration with the Grid
This paper describes the design and implementation of a model of how to integrate sensors and devices into a GRID infrastructure. We describe its proxy-based approach, the port-ty...
Jan Humble, Chris Greenhalgh, Alastair Hampshire, ...
ACNS
2003
Springer
168views Cryptology» more  ACNS 2003»
15 years 2 months ago
PLI: A New Framework to Protect Digital Content for P2P Networks
In this paper, we first propose a novel Public License Infrastructure (PLI) that uses cryptographic threshold secret sharing schemes to provide decentralized public license service...
Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang