Sciweavers

4438 search results - page 72 / 888
» On the Distribution of Keys by Hashing
Sort
View
ISM
2005
IEEE
107views Multimedia» more  ISM 2005»
15 years 5 months ago
Key Distributions as Musical Fingerprints for Similarity Assessment
— This paper presents a pitch-based approach for creating musical fingerprints for similarity assessment. An effective measure for musical similarity impacts music indexing and c...
Arpi Mardirossian, Elaine Chew
CSREAPSC
2006
15 years 1 months ago
Distributed Pairwise Key Establishment in Wireless Sensor Networks
- Security is a big challenge when wireless sensor networks are deployed in a hostile environment. Due to the computational and storage overheads, traditional asymmetric-key based ...
Yi Cheng, Dharma P. Agrawal
JCSS
2006
102views more  JCSS 2006»
14 years 12 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh
INFOCOM
2010
IEEE
14 years 10 months ago
An Optimal Key Distribution Scheme for Secure Multicast Group Communication
Abstract— Many IP multicast-based applications, such as multimedia conferencing, multiplayer games, require controlling the group memberships of senders and receivers. One common...
Zhibin Zhou, Dijiang Huang
UC
2007
Springer
15 years 6 months ago
Quantum Authenticated Key Distribution
Quantum key distributionalgorithmsuse a quantum communicationchannel with quantum information and a classical communication channel for binary information. The classical channel, ...
Naya Nagy, Selim G. Akl