Sciweavers

2601 search results - page 19 / 521
» Secure Rewarding Schemes
Sort
View
INFOCOM
2006
IEEE
15 years 5 months ago
A Secure Triple-Key Management Scheme for Wireless Sensor Networks
– Key management is critical to meet the security goals [1] to prevent the Sensor Networks being compromised by an adversary. Due to ad-hoc nature and resource limitations of sen...
Tanveer Zia, Albert Y. Zomaya
RTSS
2002
IEEE
15 years 4 months ago
Maximizing the System Value while Satisfying Time and Energy Constraints
Typical real-time scheduling theory has addressed deadline and energy constraints as well as deadline and reward constraints simultaneously in the past. However, we believe that e...
Cosmin Rusu, Rami G. Melhem, Daniel Mossé
CRYPTO
2001
Springer
106views Cryptology» more  CRYPTO 2001»
15 years 4 months ago
Forward-Secure Signatures with Optimal Signing and Verifying
We propose the first forward-secure signature scheme for which both signing and verifying are as efficient as for one of the most efficient ordinary signature schemes (Guillou-Qui...
Gene Itkis, Leonid Reyzin
APNOMS
2006
Springer
15 years 3 months ago
A Resource-Optimal Key Pre-distribution Scheme with Enhanced Security for Wireless Sensor Networks
Abstract. This paper proposes an efficient resource-optimal key predistribution scheme for providing improved security in wireless sensor networks. We exploit the advantages of two...
Tran Thanh Dai, Al-Sakib Khan Pathan, Choong Seon ...
CRYPTO
2004
Springer
121views Cryptology» more  CRYPTO 2004»
15 years 5 months ago
A New Paradigm of Hybrid Encryption Scheme
In this paper, we show that a key encapsulation mechanism (KEM) does not have to be IND-CCA secure in the construction of hybrid encryption schemes, as was previously believed. Tha...
Kaoru Kurosawa, Yvo Desmedt