Sciweavers

3115 search results - page 528 / 623
» Synthesizing Secure Protocols
Sort
View
JNW
2008
116views more  JNW 2008»
15 years 2 months ago
Scalable Revocation in Hybrid Ad Hoc Networks: The SHARL Scheme
The article proposes a simple, scalable and robust scheme for the distribution of revocation information in mobile ad hoc networks (MANETs). The scheme is intended for ad hoc netwo...
Mona Holsve Ofigsbø, Anne Marie Hegland, P&...
PPL
2010
147views more  PPL 2010»
15 years 2 months ago
Key Distribution versus Key Enhancement in Quantum Cryptography
It has been said that quantum cryptography in general o ers a secure solution to the problem of key enhancement. This means that two parties who already share a small secret key, ...
Naya Nagy, Marius Nagy, Selim G. Akl
PSD
2010
Springer
154views Database» more  PSD 2010»
15 years 2 months ago
Coprivacy: Towards a Theory of Sustainable Privacy
We introduce the novel concept of coprivacy or co-operative privacy to make privacy preservation attractive. A protocol is coprivate if the best option for a player to preserve her...
Josep Domingo-Ferrer
SCN
2010
Springer
142views Communications» more  SCN 2010»
15 years 2 months ago
How to Pair with a Human
We introduce a protocol, that we call Human Key Agreement, that allows pairs of humans to establish a key in a (seemingly hopeless) case where no public-key infrastructure is avail...
Stefan Dziembowski
IJISEC
2010
159views more  IJISEC 2010»
15 years 1 months ago
A generalization of Paillier's public-key system with applications to electronic voting
We propose a generalization of Paillier's probabilistic public key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme e...
Ivan Damgård, Mads Jurik, Jesper Buus Nielse...