Sciweavers

123 search results - page 13 / 25
» Selective Opening Security for Receivers
Sort
View
TAMC
2007
Springer
15 years 4 months ago
A Note on Universal Composable Zero Knowledge in Common Reference String Model
Pass observed that universal composable zero-knowledge (UCZK) protocols in the common reference string (CRS) model, where a common reference string is selected trustily by a truste...
Andrew Chi-Chih Yao, Frances F. Yao, Yunlei Zhao
COMPSAC
2009
IEEE
15 years 5 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
81
Voted
LREC
2010
152views Education» more  LREC 2010»
14 years 12 months ago
ANC2Go: A Web Application for Customized Corpus Creation
We describe a web application called "ANC2Go" that enables the user to select data from the Open American National Corpus (OANC) and the Manually Annotated Sub-corpus (M...
Nancy Ide, Keith Suderman, Brian Simms
ACSAC
2002
IEEE
15 years 3 months ago
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Michael Clifford
105
Voted
MASS
2010
156views Communications» more  MASS 2010»
14 years 8 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov