Sciweavers

96 search results - page 16 / 20
» A novel three-party encrypted key exchange protocol
Sort
View
CRYPTO
2004
Springer
123views Cryptology» more  CRYPTO 2004»
14 years 28 days ago
Asymptotically Optimal Communication for Torus-Based Cryptography
Abstract. We introduce a compact and efficient representation of elements of the algebraic torus. This allows us to design a new discretelog based public-key system achieving the o...
Marten van Dijk, David P. Woodruff
ICPADS
2005
IEEE
14 years 1 months ago
Separable and Anonymous Identity-Based Key Issuing
Abstract. In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is respo...
Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hu...
ADHOCNETS
2009
Springer
14 years 2 months ago
QoS over Real-Time Wireless Multi-hop Protocol
Abstract. This paper proposes a way to incorporate multimedia traffic in a real-time wireless communication network without jeopardizing the hard real-time traffic. This idea has ...
Domenico Sicignano, Danilo Tardioli, José L...
CCS
2007
ACM
14 years 1 months ago
Detecting relay attacks with timing-based protocols
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bou...
Jason Reid, Juan Manuel González Nieto, Tee...
ICEB
2004
175views Business» more  ICEB 2004»
13 years 9 months ago
Privacy-Preserving Collaborative Association Rule Mining
This paper introduces a new approach to a problem of data sharing among multiple parties, without disclosing the data between the parties. Our focus is data sharing among parties i...
Justin Z. Zhan, Stan Matwin, Nathalie Japkowicz, L...