Sciweavers

83 search results - page 5 / 17
» From Key Predistribution to Key Redistribution
Sort
View
SCN
2004
Springer
123views Communications» more  SCN 2004»
14 years 8 days ago
On the Key Exposure Problem in Chameleon Hashes
Chameleon signatures were introduced by Krawczyk and Rabin, being non-interactive signature schemes that provide non-transferability. However, that first construction employs a c...
Giuseppe Ateniese, Breno de Medeiros
SASN
2006
ACM
14 years 26 days ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
COMPSAC
2002
IEEE
13 years 12 months ago
Rights Protection for Digital Contents Redistribution Over the Internet
Although Customer-to-Customer (C2C) business model has been around for years, second-hand markets of digital contents over the Internet are unpopular. A key factor to the success ...
Shing-Chi Cheung, Hanif Curreem
SASN
2005
ACM
14 years 14 days ago
Key distribution and update for secure inter-group multicast communication
Group communication has become an important component in wireless networks. In this paper, we focus on the environments in which multiple groups coexist in the system, and both in...
Weichao Wang, Bharat K. Bhargava
CP
2005
Springer
14 years 13 days ago
Neighbourhood Clause Weight Redistribution in Local Search for SAT
Abstract. In recent years, dynamic local search (DLS) clause weighting algorithms have emerged as the local search state-of-the-art for solving propositional satisfiability proble...
Abdelraouf Ishtaiwi, John Thornton, Abdul Sattar, ...