Sciweavers

1058 search results - page 85 / 212
» Secure Group Communications Using Key Graphs
Sort
View
154
Voted
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
15 years 9 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
129
Voted
WWW
2005
ACM
16 years 3 months ago
Named graphs, provenance and trust
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that desc...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...
JSAC
2010
170views more  JSAC 2010»
14 years 9 months ago
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
Jamming-resistant communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. I...
Christina Pöpper, Mario Strasser, Srdjan Capk...
114
Voted
TKDE
2008
122views more  TKDE 2008»
15 years 2 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
TROB
2002
174views more  TROB 2002»
15 years 2 months ago
A general algorithm for robot formations using local sensing and minimal communication
Abstract-We study the problem of achieving global behavior in a group of distributed robots using only local sensing and minimal communication, in the context of formations. The go...
Jakob Fredslund, Maja J. Mataric