Sciweavers

97 search results - page 17 / 20
» Analysis of the E0 Encryption System
Sort
View
122
Voted
CORR
2004
Springer
107views Education» more  CORR 2004»
15 years 3 months ago
Security of public key cryptosystems based on Chebyshev Polynomials
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptogra...
Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Lju...
168
Voted
PIMRC
2008
IEEE
15 years 10 months ago
A key loss recovery scheme for secure broadcasts in wireless sensor networks
Abstract—Authenticity and secrecy of broadcast message content is important in wireless sensor networks deployed for battlefield control, emergency response, and natural resourc...
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...
138
Voted
WETICE
2008
IEEE
15 years 10 months ago
Integrating Overlay and Social Networks for Seamless P2P Networking
In this paper we introduce Social VPNs, a novel system architecture which leverages existing social networking infrastructures to enable ad-hoc VPNs which are self-configuring, s...
Renato J. O. Figueiredo, P. Oscar Boykin, Pierre S...
140
Voted
ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
15 years 7 months ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang
143
Voted
ACMICEC
2008
ACM
253views ECommerce» more  ACMICEC 2008»
15 years 5 months ago
Secure and efficient protocol for mobile payments
Electronic Payments have gained tremendous popularity in the modern world. Credit/debit cards and online payments are in widespread use. Bringing electronic payments to the mobile...
Rahul M. Godbole, Alwyn R. Pais