Sciweavers

190 search results - page 33 / 38
» A Wireless Security Framework without Shared Secrets
Sort
View
DCOSS
2008
Springer
13 years 9 months ago
SAKE: Software Attestation for Key Establishment in Sensor Networks
Abstract. This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor netwo...
Arvind Seshadri, Mark Luk, Adrian Perrig
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
14 years 2 months ago
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
We enrich the classical notion of group key exchange (GKE) protocols by a new property that allows each pair of users to derive an independent peer-to-peer (p2p) key on-demand and ...
Mark Manulis
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
14 years 1 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
WMTE
2005
IEEE
14 years 1 months ago
Innovative Media in Support of Distributed Intelligence and Lifelong Learning
Individual, unaided human abilities are constrained. Media have helped us to transcend boundaries in thinking, working, learning, and collaborating by supporting distributed intel...
Gerhard Fischer, Shin'ichi Konomi
USS
2010
13 years 5 months ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...