Sciweavers

86 search results - page 15 / 18
» Impossibility Results for Secret Establishment
Sort
View
CORR
2012
Springer
218views Education» more  CORR 2012»
12 years 3 months ago
On the Hardness of Welfare Maximization in Combinatorial Auctions with Submodular Valuations
We present a new type of monotone submodular functions: multi-peak submodular functions. Roughly speaking, given a family of sets F, we construct a monotone submodular function f ...
Shahar Dobzinski, Jan Vondrák
SASN
2004
ACM
14 years 1 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
ICDE
2009
IEEE
255views Database» more  ICDE 2009»
14 years 9 months ago
Database Management as a Service: Challenges and Opportunities
Data outsourcing or database as a service is a new paradigm for data management in which a third party service provider hosts a database as a service. The service provides data man...
Ahmed Metwally, Amr El Abbadi, Divyakant Agrawal, ...
CANS
2009
Springer
152views Cryptology» more  CANS 2009»
14 years 2 months ago
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
When users wish to establish wireless communication between their devices, the channel needs to be bootstrapped first. Usually, the channel is desired to be authenticated and con...
Mario Cagalj, Nitesh Saxena, Ersin Uzun
TIFS
2011
252views Education» more  TIFS 2011»
13 years 2 months ago
Secure Device Pairing Based on a Visual Channel: Design and Usability Study
— “Pairing” is the establishment of authenticated key agreement between two devices over a wireless channel. Such devices are ad hoc in nature as they lack any common preshar...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...