Sciweavers

1834 search results - page 41 / 367
» Public Key Cryptography
Sort
View
EUROCRYPT
2003
Springer
15 years 4 months ago
Provably Secure Threshold Password-Authenticated Key Exchange
Mario Di Raimondo, Rosario Gennaro
SASN
2004
ACM
15 years 4 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
EUROCRYPT
2000
Springer
15 years 2 months ago
Efficient Concurrent Zero-Knowledge in the Auxiliary String Model
We show that if any one-way function exists, then 3-round concurrent zero-knowledge arguments for all NP problems can be built in a model where a short auxiliary string with a pres...
Ivan Damgård
PERCOM
2011
ACM
14 years 2 months ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri
EUROCRYPT
2009
Springer
15 years 11 months ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...