Sciweavers

2601 search results - page 224 / 521
» Secure Rewarding Schemes
Sort
View
144
Voted
EUROCRYPT
2011
Springer
14 years 7 months ago
Unbounded HIBE and Attribute-Based Encryption
In this work, we present HIBE and ABE schemes which are “unbounded” in the sense that the public parameters do not impose additional limitations on the functionality of the sy...
Allison B. Lewko, Brent Waters
107
Voted
ISCC
2009
IEEE
149views Communications» more  ISCC 2009»
15 years 10 months ago
A secure variant of the Hill Cipher
The Hill cipher is a classical symmetric encryption algorithm that succumbs to the know-plaintext attack. Although its vulnerability to cryptanalysis has rendered it unusable in p...
Mohsen Toorani, Abolfazl Falahati
ITNG
2007
IEEE
15 years 10 months ago
THIS: THreshold security for Information aggregation in Sensor networks
Message aggregation can be used to reduce the communication overhead in a network where many messages have the “same” content. However, it may make the network less secure bec...
Hai Vu, Neeraj Mittal, Subbarayan Venkatesan
120
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling
—In this work, we prove that a positive secure degree of freedom is achievable for a large class of real Gaussian channels as long as the channel is not degraded and the channel ...
Xiang He, Aylin Yener
114
Voted
SAC
2005
ACM
15 years 9 months ago
Scalable security and accounting services for content-based publish/subscribe systems
Content-based publish/subscribe systems offer an interaction scheme that is appropriate for a variety of large scale dynamic applications. However, widespread use of these systems...
Himanshu Khurana