Sciweavers

4529 search results - page 97 / 906
» Position Based Cryptography
Sort
View
PERCOM
2007
ACM
16 years 4 months ago
Identity-Based Encryption for Sensor Networks
In spite of several years of intense research, the area of security and cryptography in Wireless Sensor Networks (WSNs) still has a number of open problems. On the other hand, the...
Leonardo B. Oliveira, Ricardo Dahab, Julio L&oacut...
PKC
2005
Springer
125views Cryptology» more  PKC 2005»
15 years 10 months ago
A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible
We answer the open question of the possibility of building a digital signature scheme with proven security based on the one-wayness of a trapdoor permutation and with signatures as...
Louis Granboulan
CTRSA
2004
Springer
120views Cryptology» more  CTRSA 2004»
15 years 10 months ago
Identity Based Undeniable Signatures
Abstract. In this paper, we give a first example of identity based undeniable signature using pairings over elliptic curves. We extend to the identity based setting the security m...
Benoît Libert, Jean-Jacques Quisquater
SUTC
2010
IEEE
15 years 9 months ago
Pollution Attack Defense for Coding Based Sensor Storage
—We present a novel information theoretic approach to make network coding based storage secure against pollution attacks in sensor networks. The approach is based on a new decodi...
Levente Buttyán, Laszlo Czap, István...
CHES
2009
Springer
171views Cryptology» more  CHES 2009»
16 years 5 months ago
The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators
We have devised a frequency injection attack which is able to destroy the source of entropy in ring-oscillator-based true random number generators (TRNGs). A TRNG will lock to freq...
A. Theodore Markettos, Simon W. Moore