Sciweavers

1058 search results - page 74 / 212
» Secure Group Communications Using Key Graphs
Sort
View
IJNSEC
2010
66views more  IJNSEC 2010»
14 years 9 months ago
Finding Traitors in Secure Networks Using Byzantine Agreements
Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
Liam Wagner, Stuart McDonald
98
Voted
ACSAC
1999
IEEE
15 years 6 months ago
Security Relevancy Analysis on the Registry of Windows NT 4.0
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
Wenliang Du, Praerit Garg, Aditya P. Mathur
113
Voted
LCN
2007
IEEE
15 years 8 months ago
Secure Anonymous Broadcasting in Vehicular Networks
—Vehicular networks face a typical quandary in their requirement for communications that are at once secure and private. While the messages broadcast between vehicles and between...
Christine Laurendeau, Michel Barbeau
123
Voted
EUROCRYPT
2007
Springer
15 years 8 months ago
Atomic Secure Multi-party Multiplication with Low Communication
We consider the standard secure multi-party multiplication protocol due to M. Rabin. This protocol is based on Shamir’s secret sharing scheme and it can be viewed as a practical ...
Ronald Cramer, Ivan Damgård, Robbert de Haan
SAC
2010
ACM
15 years 7 months ago
Secret interest groups (SIGs) in social networks with an implementation on Facebook
In this paper we present the first framework that allows the creation of Secret Interest Groups (SIGs) in Online Social Networks; SIGs are self managed groups formed outside of t...
Alessandro Sorniotti, Refik Molva