Sciweavers

24529 search results - page 121 / 4906
» Computing on Authenticated Data
Sort
View
IJNSEC
2008
126views more  IJNSEC 2008»
15 years 2 months ago
A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying
We present a hybrid group key management protocol that incorporates both a centralized and a contributory scheme for key management, and a tree-based Elliptic Curve Diffie-Hellman...
Depeng Li, Srinivas Sampalli
FUIN
2007
104views more  FUIN 2007»
15 years 2 months ago
Modelling and Checking Timed Authentication of Security Protocols
In this paper we offer a novel methodology for verifying correctness of (timed) security protocols. The idea consists in computing the time of a correct execution of a session and ...
Gizela Jakubowska, Wojciech Penczek
124
Voted
ICDE
2011
IEEE
271views Database» more  ICDE 2011»
14 years 6 months ago
Authentication of moving kNN queries
— A moving kNN query continuously reports the k nearest neighbors of a moving query point. In addition to the query result, a service provider that evaluates moving queries often...
Man Lung Yiu, Eric Lo, Duncan Yung
CSIE
2009
IEEE
15 years 7 months ago
Flash-Based Tool for Earthquake Epicenter Identification
Previously, the methods used by scientists to locate an earthquake epicenter were so cumbersome, even for scientists, that the epicenter location methodology needed to be simplifi...
Youwen Ouyang, Matthew Lehmann, Katherine Hayden, ...
DAC
2010
ACM
15 years 6 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic