Biometrics gain increasing interest as a solution for many security issues, but privacy risks exist in case we do not protect the stored templates well. This paper presents a new ...
We describe a simple and novel cryptographic construction that we refer to as a fuzzy vault. A player Alice may place a secret value in a fuzzy vault and "lock" it using ...
Abstract. At CRYPTO 2003, Rubin and Silverberg introduced the concept of torus-based cryptography over a finite field. We extend their setting to the ring of integers modulo N. W...
— Because of limited resources at sensor nodes, sensor networks typically adopt symmetric-key algorithms to provide security functions such as protecting communications between n...
—In wireless sensor networks, sensor nodes are expected to gather specific information about the environment and send it to the user. The data dissemination usually involves many...