Sciweavers

250 search results - page 12 / 50
» Modeling Public Key Infrastructures in the Real World
Sort
View
JNW
2008
99views more  JNW 2008»
14 years 9 months ago
Probabilistic Key Management Practical Concerns in Wireless Sensor Networks
The subject of Key Management in Wireless Sensor Networks has gained increased attention from the security community around the world in the last years. Several proposals were made...
Rui Miguel Soares Silva, Nuno Sidónio A. Pe...
WETICE
2005
IEEE
15 years 3 months ago
Trust Infrastructure for Policy based Messaging In Open Environments
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforced at recipient systems to provide security features. PBM promotes a distributed...
Gansen Zhao, David W. Chadwick
TCC
2009
Springer
124views Cryptology» more  TCC 2009»
15 years 10 months ago
Universally Composable Multiparty Computation with Partially Isolated Parties
It is well known that universally composable multiparty computation cannot, in general, be achieved in the standard model without setup assumptions when the adversary can corrupt a...
Ivan Damgård, Jesper Buus Nielsen, Daniel Wi...
IJSN
2007
94views more  IJSN 2007»
14 years 9 months ago
On security proof of McCullagh?Barreto's key agreement protocol and its variants
: McCullagh and Barreto presented an identity-based authenticated key agreement protocol in CT-RSA 2005. Their protocol was found to be vulnerable to a key-compromise impersonation...
Zhaohui Cheng, Liqun Chen
ROBIO
2006
IEEE
123views Robotics» more  ROBIO 2006»
15 years 3 months ago
Evolutionary Robotics, Anticipation and the Reality Gap
— Evolutionary Robotics provide efficient tools and approach to address automatic design of controllers for automous mobile robots. However, the computational cost of the optimi...
Cédric Hartland, Nicolas Bredeche