Sciweavers

487 search results - page 59 / 98
» Integral Invariant Signatures
Sort
View
SECON
2007
IEEE
14 years 4 months ago
Multi-user Broadcast Authentication in Wireless Sensor Networks
— Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows the mobile users of WSNs to broadcast messages to multiple sensor nodes...
Kui Ren, Wenjing Lou, Yanchao Zhang
EUROSSC
2007
Springer
14 years 4 months ago
Mapping by Seeing - Wearable Vision-Based Dead-Reckoning, and Closing the Loop
We introduce, characterize and test a vision-based dead-reckoning system for wearable computing that allows to track the user’s trajectory in an unknown and non-instrumented envi...
Daniel Roggen, Reto Jenny, Patrick de la Hamette, ...
WCC
2005
Springer
172views Cryptology» more  WCC 2005»
14 years 3 months ago
Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems
Abstract. The Matsumoto-Imai (MI) cryptosystem was the first multivariate public key cryptosystem proposed for practical use. Though MI is now considered insecure due to Patarin...
Adama Diene, Jintai Ding, Jason E. Gower, Timothy ...
CIA
2003
Springer
14 years 3 months ago
Trust Networks on the Semantic Web
The so-called "Web of Trust" is one of the ultimate goals of the Semantic Web. Research on the topic of trust in this domain has focused largely on digital signatures, ce...
Jennifer Golbeck, Bijan Parsia, James A. Hendler
FSE
2001
Springer
116views Cryptology» more  FSE 2001»
14 years 2 months ago
NESSIE: A European Approach to Evaluate Cryptographic Algorithms
The NESSIE project (New European Schemes for Signature, Integrity and Encryption) intends to put forward a portfolio containing the next generation of cryptographic primitives. The...
Bart Preneel