Sciweavers

3504 search results - page 511 / 701
» Secure protocol composition
Sort
View
IJACT
2008
64views more  IJACT 2008»
15 years 2 months ago
An efficient one-move Nominative Signature scheme
Abstract. A signer in a Nominative Signature (NS) scheme can arbitrarily choose a nominee, then jointly generate a signature in such a way that the signature can only be verified w...
Qiong Huang, Dennis Y. W. Liu, Duncan S. Wong
144
Voted
TIFS
2008
208views more  TIFS 2008»
15 years 2 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
PAIRING
2010
Springer
152views Cryptology» more  PAIRING 2010»
15 years 23 days ago
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these dev...
Koen Simoens, Roel Peeters, Bart Preneel
IACR
2011
94views more  IACR 2011»
14 years 2 months ago
After-the-Fact Leakage in Public-Key Encryption
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but onl...
Shai Halevi, Huijia Lin
IPMI
2001
Springer
16 years 3 months ago
Analyzing the Neocortical Fine-Structure
Cytoarchitectonic fields of the human neocortex are defined by characteristic variations in the composition of a general six-layer structure. It is commonly accepted that these fie...
Christopher J. Wiggins, D. Yves von Cramon, Frithj...