Sciweavers

777 search results - page 15 / 156
» Secure broadcasting in large networks
Sort
View
WECWIS
2002
IEEE
106views ECommerce» more  WECWIS 2002»
15 years 2 months ago
I-DG: A Secure Protocol for Disseminating Data to Subscribers via IP Multicast
This paper proposes the IP Multicast-enabled Drop Groups (I-DG) protocol as a solution to the problem of efficiently and securely disseminating information to a large number of s...
Aslihan Celik, JoAnne Holliday, Bindumadhavi Ramav...
79
Voted
INFOCOM
2008
IEEE
15 years 4 months ago
The Speed of Information Propagation in Large Wireless Networks
Abstract—This paper investigates the speed limit of information propagation in large wireless networks, which provides fundamental understanding of the fastest information transp...
Yi Xu, Wenye Wang
CCS
2008
ACM
14 years 11 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
WINET
2002
101views more  WINET 2002»
14 years 9 months ago
SPINS: Security Protocols for Sensor Networks
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and u...
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victo...
IJNSEC
2010
104views more  IJNSEC 2010»
14 years 4 months ago
Construction of Large Families of Pseudorandom Subsets of the Set {1, 2, ..., N} Using Elliptic Curves
Pseudo-random subsets of the set {1, 2, . . . , N} have many applications in the fields of network security, cryptography and other security issues. Recently, Dartyge and S
Zhixiong Chen, Li Xu, Chenhuang Wu