Sciweavers

1612 search results - page 235 / 323
» About models of security protocols
Sort
View
129
Voted
CRYPTO
2004
Springer
139views Cryptology» more  CRYPTO 2004»
15 years 9 months ago
How to Compress Rabin Ciphertexts and Signatures (and More)
Ordinarily, RSA and Rabin ciphertexts and signatures are log N bits, where N is a composite modulus; here, we describe how to “compress” Rabin ciphertexts and signatures (among...
Craig Gentry
150
Voted
GLOBECOM
2008
IEEE
15 years 10 months ago
On Relay Nodes Deployment for Distributed Detection in Wireless Sensor Networks
—In this paper, the problem of deploying relay nodes in wireless sensor networks will be considered. A system consisting of a set of sensor nodes communicating to a fusion center...
Karim G. Seddik, K. J. Ray Liu
SIGSOFT
2010
ACM
15 years 1 months ago
Realizability analysis for message-based interactions using shared-state projections
The global interaction behavior in message-based systems can be specified as a finite-state machine defining acceptable sequences of messages exchanged by a group of peers. Realiz...
Sylvain Hallé, Tevfik Bultan
FSE
2004
Springer
130views Cryptology» more  FSE 2004»
15 years 9 months ago
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan
A cryptanalysis is given of a MAC proposal presented at CRYPTO 2003 by Cary and Venkatesan. A nice feature of the CaryVenkatesan MAC is that a lower bound on its security can be pr...
Simon R. Blackburn, Kenneth G. Paterson
ISCIS
2005
Springer
15 years 9 months ago
Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation
A P2P network that is overlayed over Internet can consist of thousands, or even millions of nodes. To analyze the performance of a P2P network, or an algorithm or protocol designed...
Selim Ciraci, Ibrahim Korpeoglu, Özgür U...