Sciweavers

2108 search results - page 293 / 422
» Encrypted
Sort
View
113
Voted
ENTCS
2006
124views more  ENTCS 2006»
15 years 2 months ago
A New Rabin-type Trapdoor Permutation Equivalent to Factoring
Public key cryptography has been invented to overcome some key management problems in open networks. Although nearly all aspects of public key cryptography rely on the existence of...
Katja Schmidt-Samoa
144
Voted
IJSN
2008
114views more  IJSN 2008»
15 years 2 months ago
Adaptive clustering for scalable key management in dynamic group communications
: Group key management has received a particular attention, these last years, in both academic and industry research communities. This is due to the economical relevance of group-b...
Yacine Challal, Said Gharout, Abdelmadjid Bouabdal...
100
Voted
CORR
2007
Springer
130views Education» more  CORR 2007»
15 years 2 months ago
Achievable Rates for Two-Way Wire-Tap Channels
—We consider two-way wire-tap channels, where two users are communicating with each other in the presence of an eavesdropper, who has access to the communications through a multi...
Ender Tekin, Aylin Yener
INFORMATICALT
2006
134views more  INFORMATICALT 2006»
15 years 2 months ago
Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem
We know the necessity for information security becomes more widespread in these days, especially for hardware-based implementations such as smart cards chips for wireless applicati...
Chia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, Te-Je...
JDCTA
2008
74views more  JDCTA 2008»
15 years 2 months ago
Processing Logical Access Control Command in Computer System
Access control includes physical and logical access control. Physical access control protects the damage, theft and losing of assess. In this paper, we propose the method to prote...
Tsang-Yean Lee, Huey-Ming Lee, Wuu-Yee Chen, Heng-...