Sciweavers

1058 search results - page 123 / 212
» Secure Group Communications Using Key Graphs
Sort
View
145
Voted
IEEECIT
2010
IEEE
15 years 1 months ago
An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures
Abstract—In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploitin...
Rehana Yasmin, Eike Ritter, Guilin Wang
ICICS
2001
Springer
15 years 7 months ago
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes
Abstract. In this paper, the cryptanalytic strength of two HwangRao Secret Error-Correcting Code (SECC) schemes is examined under a known-plaintext attack. In particular, we found ...
Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao
116
Voted
BMCBI
2008
121views more  BMCBI 2008»
15 years 2 months ago
iRefIndex: A consolidated protein interaction database with provenance
Background: Interaction data for a given protein may be spread across multiple databases. We set out to create a unifying index that would facilitate searching for these data and ...
Sabry Razick, George Magklaras, Ian M. Donaldson
SP
2006
IEEE
102views Security Privacy» more  SP 2006»
15 years 8 months ago
Secure Device Pairing based on a Visual Channel (Short Paper)
Recently several researchers and practitioners have begun to address the problem of how to set up secure communication between two devices without the assistance of a trusted thir...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...
138
Voted
CORR
2012
Springer
195views Education» more  CORR 2012»
13 years 10 months ago
Ranking hubs and authorities using matrix functions
The notions of subgraph centrality and communicability, based on the exponential of the adjacency matrix of the underlying graph, have been effectively used in the analysis of und...
Michele Benzi, Ernesto Estrada, Christine Klymko