Sciweavers

648 search results - page 56 / 130
» Authenticated hash tables
Sort
View
SP
2006
IEEE
102views Security Privacy» more  SP 2006»
14 years 4 months ago
Secure Device Pairing based on a Visual Channel (Short Paper)
Recently several researchers and practitioners have begun to address the problem of how to set up secure communication between two devices without the assistance of a trusted thir...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...
BROADNETS
2005
IEEE
14 years 3 months ago
Privacy enhanced access control in pervasive computing environments
Abstract— Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authen...
Kui Ren, Wenjing Lou
CCS
2000
ACM
14 years 1 months ago
Accountable certificate management using undeniable attestations
This paper initiates a study of accountable certificate management methods, necessary to support long-term authenticity of digital documents. Our main contribution is a model for ...
Ahto Buldas, Peeter Laud, Helger Lipmaa
TWC
2008
122views more  TWC 2008»
13 years 9 months ago
TSVC: timed efficient and secure vehicular communications with privacy preserving
In this paper, we propose a Timed Efficient and Secure Vehicular Communication (TSVC) scheme with privacy preservation, which aims at minimizing the packet overhead in terms of sig...
Xiaodong Lin, Xiaoting Sun, Xiaoyu Wang, Chenxi Zh...
PVLDB
2010
164views more  PVLDB 2010»
13 years 8 months ago
FlashStore: High Throughput Persistent Key-Value Store
We present FlashStore, a high throughput persistent keyvalue store, that uses flash memory as a non-volatile cache between RAM and hard disk. FlashStore is designed to store the ...
Biplob Debnath, Sudipta Sengupta, Jin Li