Sciweavers

5891 search results - page 109 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
IEEEPACT
1998
IEEE
15 years 5 months ago
A Fast Interrupt Handling Scheme for VLIW Processors
Emre Özer, Sumedh W. Sathaye, Kishore N. Mene...
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 8 months ago
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
We enrich the classical notion of group key exchange (GKE) protocols by a new property that allows each pair of users to derive an independent peer-to-peer (p2p) key on-demand and ...
Mark Manulis
SCN
2010
Springer
144views Communications» more  SCN 2010»
14 years 12 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng
PERCOM
2010
ACM
14 years 12 months ago
An integrated system for secure code distribution in Wireless Sensor Networks
—This paper presents a Secure Code Update (SCU) system for Wireless Sensor Networks (WSNs). This solution achieves different security goals. First, through a dedicated authentica...
Nicola Bui, Osman Ugus, Moreno Dissegna, Michele R...