Sciweavers

231 search results - page 40 / 47
» Generalized Identity Based and Broadcast Encryption Schemes
Sort
View
MMSEC
2004
ACM
104views Multimedia» more  MMSEC 2004»
14 years 29 days ago
Key-assignment strategies for CPPM
CSS, the first system to protect multimedia content on the new DVD medium failed badly, because both its encryption algorithm and its key management could easily be broken. A new ...
André Adelsbach, Jörg Schwenk
LFCS
2007
Springer
14 years 1 months ago
Model Checking Knowledge and Linear Time: PSPACE Cases
We present a general algorithm scheme for model checking logics of knowledge, common knowledge and linear time, based on simulations to a class of structures that capture the way t...
Kai Engelhardt, Peter Gammie, Ron van der Meyden
ICDCS
2009
IEEE
13 years 5 months ago
Multicast Throughput of Hybrid Wireless Networks Under Gaussian Channel Model
We study the multicast capacity for hybrid wireless networks consisting of ordinary wireless nodes and base stations under Gaussian Channel model, which generalizes both the unica...
Cheng Wang, ShaoJie Tang, Xiang-Yang Li, Changjun ...
CCS
2007
ACM
14 years 1 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...
TCC
2009
Springer
142views Cryptology» more  TCC 2009»
14 years 8 months ago
Chosen-Ciphertext Security via Correlated Products
We initiate the study of one-wayness under correlated products. We are interested in identifying necessary and sufficient conditions for a function f and a distribution on inputs ...
Alon Rosen, Gil Segev