Sciweavers

357 search results - page 24 / 72
» Distributed Attribute-Based Encryption
Sort
View
IJNSEC
2008
124views more  IJNSEC 2008»
13 years 9 months ago
Scalable Delay-constrained Multicast Group Key Management
In the last few years, multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. Some multicast applications requi...
Said Gharout, Yacine Challal, Abdelmadjid Bouabdal...
CLADE
2004
IEEE
14 years 26 days ago
Support for Data-Intensive, Variable-Granularity Grid Applications via Distributed File System Virtualization - A Case Study of
A key challenge faced by large-scale, distributed applications in Grid environments is efficient, seamless data management. In particular, for applications that can benefit from a...
Jithendar Paladugula, Ming Zhao 0002, Renato J. O....
COMPSAC
2000
IEEE
14 years 1 months ago
Practical Key Distribution Schemes for Channel Protection
– This paper presents three key distribution schemes for channel protection. With the proposed schemes, encryption keys of the ordered programs can be distributed to the authoriz...
Yu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyua...
FPL
2006
Springer
147views Hardware» more  FPL 2006»
14 years 23 days ago
Secure Content Distribution System Based on Run-Time Partial Hardware Reconfiguration
A secure content distribution system is prototyped based on run-time partial reconfigurability of an FPGA. The system provides a robust content protection scheme for online conten...
Yohei Hori, Hiroyuki Yokoyama, Kenji Toda
DCC
2000
IEEE
13 years 9 months ago
Relating Differential Distribution Tables to Other Properties of of Substitution Boxes
Due to the success of differential and linear attacks on a large number of encryption algorithms, it is importanttoinvestigaterelationshipsamongvariouscryptographic, includingdiffe...
Xian-Mo Zhang, Yuliang Zheng, Hideki Imai