Sciweavers

3504 search results - page 511 / 701
» Secure protocol composition
Sort
View
IJACT
2008
64views more  IJACT 2008»
15 years 1 months ago
An efficient one-move Nominative Signature scheme
Abstract. A signer in a Nominative Signature (NS) scheme can arbitrarily choose a nominee, then jointly generate a signature in such a way that the signature can only be verified w...
Qiong Huang, Dennis Y. W. Liu, Duncan S. Wong
TIFS
2008
208views more  TIFS 2008»
15 years 1 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
118
Voted
PAIRING
2010
Springer
152views Cryptology» more  PAIRING 2010»
15 years 3 days ago
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these dev...
Koen Simoens, Roel Peeters, Bart Preneel
IACR
2011
94views more  IACR 2011»
14 years 1 months ago
After-the-Fact Leakage in Public-Key Encryption
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but onl...
Shai Halevi, Huijia Lin
IPMI
2001
Springer
16 years 2 months ago
Analyzing the Neocortical Fine-Structure
Cytoarchitectonic fields of the human neocortex are defined by characteristic variations in the composition of a general six-layer structure. It is commonly accepted that these fie...
Christopher J. Wiggins, D. Yves von Cramon, Frithj...