Sciweavers

3544 search results - page 61 / 709
» Information Security in Open Systems
Sort
View
110
Voted
ICISS
2009
Springer
15 years 11 months ago
On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals
Massimiliano Masi, Rosario Pugliese, Francesco Tie...
161
Voted
EUROCRYPT
2009
Springer
16 years 5 months ago
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
Recently, at Crypto 2008, Boneh, Halevi, Hamburg, and Ostrovsky (BHHO) solved the longstanding open problem of "circular encryption," by presenting a public key encrypti...
Jan Camenisch, Nishanth Chandran, Victor Shoup
NORDSEC
2009
Springer
15 years 9 months ago
ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System
In this paper we introduce ContikiSec, a secure network layer for wireless sensor networks, designed for the Contiki Operating System. ContikiSec has a configurable design, providi...
Lander Casado, Philippas Tsigas