Sciweavers

1395 search results - page 80 / 279
» Communication Security in Multi-agent Systems
Sort
View
ICICS
2010
Springer
13 years 6 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
USS
2008
13 years 11 months ago
Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security
A fundamental tension exists between safety in the common case and security under adversarial conditions for wireless implantable medical devices. We propose a class of new, fail-...
Tamara Denning, Kevin Fu, Tadayoshi Kohno
CCS
2007
ACM
14 years 3 months ago
On the accuracy of decentralized virtual coordinate systems in adversarial networks
Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine the latency to arbitrary hosts without actively monitoring all ...
David John Zage, Cristina Nita-Rotaru
HICSS
2007
IEEE
85views Biometrics» more  HICSS 2007»
14 years 3 months ago
Leveraging Computational Grid Technologies for Building a Secure and Manageable Power Grid
The US Power Industry is in the process of overhauling the Power Grid to make it more secure, reliable, and available. The IT systems that comprise a major part of this change nee...
Himanshu Khurana, Mohammad Maifi Hasan Khan, Von W...
GLOBECOM
2006
IEEE
14 years 2 months ago
A Lightweight Secure Solution for RFID
— Radio Frequency Identification (RFID) systems have provided promising solutions to effective identification of a large number of tagged objects. However, RFID systems suffer ...
Bo Sun, Chung-Chih Li, Yang Xiao