Sciweavers

362 search results - page 39 / 73
» Abstraction in Cryptography
Sort
View
ECCC
2006
88views more  ECCC 2006»
13 years 8 months ago
On Probabilistic versus Deterministic Provers in the Definition of Proofs Of Knowledge
Abstract. This article points out a gap between two natural formulations of the concept of a proof of knowledge, and shows that in all natural cases (e.g., NP-statements) this gap ...
Mihir Bellare, Oded Goldreich
SCN
2008
Springer
166views Communications» more  SCN 2008»
13 years 8 months ago
Secure, pseudonymous, and auditable communication in vehicular ad hoc networks
Abstract-- Vehicular ad hoc networks (VANETs) represent a promising new communication technology that can facilitate many new forms of automotive applications. Many of the applicat...
Pandurang Kamat, Arati Baliga, Wade Trappe
JOC
2000
78views more  JOC 2000»
13 years 8 months ago
Practical Aspects of Quantum Cryptographic Key Distribution
Abstract. Performance of various experimental realizations of quantum cryptographic protocols using polarization or phase coding are compared, including a new self-balanced interfe...
Hugo Zbinden, Nicolas Gisin, B. Huttner, A. Muller...
SETA
2010
Springer
164views Mathematics» more  SETA 2010»
13 years 7 months ago
Synchronization of Boolean Dynamical Systems: A Spectral Characterization
Abstract. In this paper a spectral characterization of the synchronization property of Boolean dynamical systems is provided. Conditions on the spectrum of the next-state function ...
Jérémy Parriaux, Philippe Guillot, G...
WISTP
2010
Springer
13 years 6 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel