Sciweavers

3482 search results - page 219 / 697
» Designing for security
Sort
View
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
14 years 4 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
DSD
2006
IEEE
183views Hardware» more  DSD 2006»
14 years 3 months ago
Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core
The Advanced Encryption Standard (AES) algorithm has become the default choice for various security services in numerous applications. In this paper we present an AES encryption h...
Panu Hämäläinen, Timo Alho, Marko H...
CHES
2005
Springer
170views Cryptology» more  CHES 2005»
14 years 3 months ago
Design of Testable Random Bit Generators
Abstract. In this paper, the evaluation of random bit generators for security applications is discussed and the concept of stateless generator is introduced. It is shown how, for t...
Marco Bucci, Raimondo Luzzi
CARDIS
2010
Springer
162views Hardware» more  CARDIS 2010»
14 years 28 days ago
On the Design and Implementation of an Efficient DAA Scheme
Abstract. Direct Anonymous Attestation (DAA) is an anonymous digital signature scheme that aims to provide both signer authentication and privacy. One of the properties that makes ...
Liqun Chen, Dan Page, Nigel P. Smart
CANS
2008
Springer
111views Cryptology» more  CANS 2008»
13 years 11 months ago
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
In a (r, n)-threshold secret sharing scheme, no group of (r - 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time...
Tiancheng Lou, Christophe Tartary