Sciweavers

1190 search results - page 157 / 238
» Secure off-the-record messaging
Sort
View
CRYPTO
2005
Springer
116views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
New Monotones and Lower Bounds in Unconditional Two-Party Computation
Since bit and string oblivious transfer and commitment, two primitives of paramount importance in secure two- and multi-party computation, cannot be realized in an unconditionally ...
Stefan Wolf, Jürg Wullschleger
ICICS
2004
Springer
15 years 6 months ago
Dynamic Access Control for Multi-privileged Group Communications
Abstract. Recently, there is an increase in the number of group communication applications which support multiple service groups of different access privileges. Traditional access...
Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li
114
Voted
IPSN
2003
Springer
15 years 5 months ago
A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks
Abstract. This paper evaluates the performance of INSENS, an INtrusion-tolerant routing protocol for wireless SEnsor Networks. Security in sensor networks is important in battlefi...
Jing Deng, Richard Han, Shivakant Mishra
SACRYPT
1998
Springer
173views Cryptology» more  SACRYPT 1998»
15 years 4 months ago
A Lattice-Based Public-Key Cryptosystem
In 1998, Cai and Cusick proposed a lattice-based public-key cryptosystem based on the similar ideas of the Ajtai-Dwork cryptosystem, but with much less data expansion. However, th...
Jin-yi Cai, Thomas W. Cusick
MA
1997
Springer
127views Communications» more  MA 1997»
15 years 4 months ago
The Architecture of the Ara Platform for Mobile Agents
: We describe a platform for the portable and secure execution of mobile agents written in various interpreted languages on top of a common run-time core. Agents may migrate at any...
Holger Peine, Torsten Stolpmann