Sciweavers

1255 search results - page 110 / 251
» On Simple and Secure Key Distribution
Sort
View
113
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF
Abstract— Most e-government applications have to find a solution for simple, reliable, secure and authentic signing of official documents. Citizens need a simple way to verify ...
Thomas Neubauer, Edgar Weippl, Stefan Biffl
139
Voted
BSN
2009
IEEE
140views Sensor Networks» more  BSN 2009»
15 years 10 months ago
A Distributed Hidden Markov Model for Fine-grained Annotation in Body Sensor Networks
—Human movement models often divide movements into parts. In walking the stride can be segmented into four different parts, and in golf and other sports, the swing is divided int...
Eric Guenterberg, Hassan Ghasemzadeh, Roozbeh Jafa...
INFOCOM
2003
IEEE
15 years 9 months ago
Probing strategies for distributed admission control in large and small scale systems
— The aim of this article is to propose and analyse measurement-based admission control schemes. We distinguish between large-scale and small-scale systems, where scale is measur...
Peter B. Key, Laurent Massoulié
143
Voted
SISW
2005
IEEE
15 years 9 months ago
Lazy Revocation in Cryptographic File Systems
A crucial element of distributed cryptographic file systems are key management solutions that allow for flexible but secure data sharing. We consider efficient key management s...
Michael Backes, Christian Cachin, Alina Oprea
174
Voted
IACR
2011
196views more  IACR 2011»
14 years 3 months ago
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Gilad Asharov, Abhishek Jain, Daniel Wichs