Sciweavers

247 search results - page 9 / 50
» A Self-healing Key Distribution Scheme with Novel Properties
Sort
View
SIAMMA
2010
90views more  SIAMMA 2010»
13 years 3 months ago
A General Proximity Analysis of Nonlinear Subdivision Schemes
In recent work nonlinear subdivision schemes which operate on manifold-valued data have been successfully analyzed with the aid of so-called proximity conditions bounding the diffe...
Philipp Grohs
ISPEC
2011
Springer
12 years 11 months ago
Traitor Tracing against Public Collaboration
Abstract. Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel. Traitor tracing is needed because some ...
Xingwen Zhao, Fangguo Zhang
INDOCRYPT
2004
Springer
14 years 2 months ago
New ID-Based Threshold Signature Scheme from Bilinear Pairings
ID-based public key systems allow the user to use his/her identity as the public key, which can simplify key management procedure compared with CA-based public key systems. However...
Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, ...
PERCOM
2011
ACM
13 years 14 days ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri
PERCOM
2009
ACM
14 years 3 months ago
Securing Body Sensor Networks: Sensor Association and Key Management
—Body Sensor Networks can be used to continuously monitor patients’ health. However, secure association of sensors with the patient and key management for providing integrity a...
Sye Loong Keoh, Emil C. Lupu, Morris Sloman