Sciweavers

357 search results - page 22 / 72
» Distributed Attribute-Based Encryption
Sort
View
CSFW
2003
IEEE
14 years 2 months ago
Type-Based Distributed Access Control
A type system is presented that combines a weak form of information flow control, termed distributed access control in the paper, with typed cryptographic operations. The motivat...
Tom Chothia, Dominic Duggan, Jan Vitek
CCIA
2009
Springer
13 years 10 months ago
A Cryptographic Solution for Private Distributed Simple Meeting Scheduling
Meeting Scheduling is a suitable application for distributed computation, motivated by its privacy requirements. Previous work on this problem have considered some cryptographic te...
Javier Herranz, Stan Matwin, Pedro Meseguer, Jordi...
NGC
1999
Springer
106views Communications» more  NGC 1999»
14 years 1 months ago
Watercasting: Distributed Watermarking of Multicast Media
We outline a scheme by which encrypted multicast audiovisual data may be watermarked by lightweight active network components in the multicast tree. Every recipient receives a slig...
Ian Brown, Colin Perkins, Jon Crowcroft
CCS
2003
ACM
14 years 23 days ago
LEAP: efficient security mechanisms for large-scale distributed sensor networks
We describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the ...
Sencun Zhu, Sanjeev Setia, Sushil Jajodia
PE
2002
Springer
158views Optimization» more  PE 2002»
13 years 8 months ago
Comparison of inter-area rekeying algorithms for secure wireless group communications
Many emerging mobile wireless applications depend upon secure group communications, in which data is encrypted and the group's data encryption key is changed whenever a membe...
Chun Zhang, Brian DeCleene, James F. Kurose, Donal...