Sciweavers

1255 search results - page 65 / 251
» On Simple and Secure Key Distribution
Sort
View
133
Voted
AIMS
2008
Springer
15 years 5 months ago
A Distributed Certification System for Structured P2P Networks
In this paper, we present a novel distributed certification system in which signing a certificate needs the collaboration of a fixed ratio of the nodes, hence a varying number of n...
François Lesueur, Ludovic Mé, Val&ea...
PERVASIVE
2006
Springer
15 years 3 months ago
Scalability in a Secure Distributed Proof System
Abstract. A logic-based language is often adopted in systems for pervasive computing, because it provides a convenient way to define rules that change the behavior of the systems d...
Kazuhiro Minami, David Kotz
CHES
2006
Springer
133views Cryptology» more  CHES 2006»
15 years 7 months ago
Fast Generation of Prime Numbers on Portable Devices: An Update
The generation of prime numbers underlies the use of most public-key cryptosystems, essentially as a primitive needed for the creation of RSA key pairs. Surprisingly enough, despit...
Marc Joye, Pascal Paillier
149
Voted
WOWMOM
2009
ACM
142views Multimedia» more  WOWMOM 2009»
15 years 10 months ago
Securing wireless communication with implanted medical devices using reciprocal carrier-phase quantization
Securing wireless communication with resourceconstrained implanted medical devices is considered. A method for refreshing symmetric encryption keys by reciprocal quantization of t...
Gill R. Tsouri
125
Voted
EDOC
2004
IEEE
15 years 7 months ago
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. T...
Nobukazu Yoshioka, Shinichi Honiden, Anthony Finke...