Sciweavers

322 search results - page 39 / 65
» Entity Authentication and Key Distribution
Sort
View
FC
2000
Springer
119views Cryptology» more  FC 2000»
14 years 3 days ago
Sharing Decryption in the Context of Voting or Lotteries
Abstract. Several public key cryptosystems with additional homomorphic properties have been proposed so far. They allow to perform computation with encrypted data without the knowl...
Pierre-Alain Fouque, Guillaume Poupard, Jacques St...
CSREASAM
2003
13 years 10 months ago
Defending Against Denial of Service Attacks Using Secure Name Resolution
This paper proposes a technique to foil DoS (Denial of Service) attacks. The proposed technique converts a static service to a relocating service and provides information of the n...
Prashant Dewan, Partha Dasgupta, Vijay Karamcheti
WINET
2002
146views more  WINET 2002»
13 years 8 months ago
Disconnection Modes for Mobile Databases
Abstract. As mobility permeates into todays computing and communication arena, we envision application infrastructures that will increasingly rely on mobile technologies. Tradition...
JoAnne Holliday, Divyakant Agrawal, Amr El Abbadi
ISPA
2007
Springer
14 years 2 months ago
A Secure Energy-Efficient Routing Protocol for WSN
The intent of this paper is to propose an energy-efficient routing protocol with data transmission security for wireless sensor networks. We create an energy and distance aware sin...
Al-Sakib Khan Pathan, Choong Seon Hong
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
14 years 1 months ago
A Coloured Petri Net Trust Model
Public-key infrastructures are a prerequisite for security in distributed systems and for reliable electronic commerce. It is their goal to provide the authenticity of public keys...
Peter Lory