Sciweavers

1058 search results - page 80 / 212
» Secure Group Communications Using Key Graphs
Sort
View
110
Voted
COMCOM
2006
111views more  COMCOM 2006»
15 years 2 months ago
SCON: Secure management of continuity in sensor networks
Due to limited energy capacity of batteries, the function lifetime of sensor networks in general is longer than the operational lifetime of single nodes. Therefore, to keep the ne...
Arjan Durresi, Vijay Bulusu, Vamsi Paruchuri
GLOBECOM
2010
IEEE
15 years 11 days ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate
96
Voted
COMCOM
2004
83views more  COMCOM 2004»
15 years 2 months ago
Breaking network security based on synchronized chaos
Very recently, the use of chaos synchronization as a means of masking information data in a network has been proposed. Although it is claimed that the security breach is not possi...
Gonzalo Álvarez, Shujun Li
TIT
2010
150views Education» more  TIT 2010»
14 years 9 months ago
Information-theoretic key agreement of multiple terminals: part I
This is the first part of a two-part paper on information-theoretically secure secret key agreement. In this part, we study the secrecy problem under the widely studied source mod...
Amin Aminzadeh Gohari, Venkat Anantharam
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
14 years 2 months ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters