Sciweavers

631 search results - page 2 / 127
» Intrusion-Resilient Secure Channels
Sort
View
CISC
2006
Springer
131views Cryptology» more  CISC 2006»
14 years 2 months ago
Efficient Intrusion-Resilient Signatures Without Random Oracles
Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forward-secure and key-insulated signatures. As in the latter schemes, time is divided into di...
Benoît Libert, Jean-Jacques Quisquater, Moti...
IJSN
2006
123views more  IJSN 2006»
13 years 10 months ago
A survey of key evolving cryptosystems
: This paper presents a survey of key evolving cryptosystems in the public key setting, focusing on two main approaches: `forward security' and `intrusion resilience'. Th...
Matthew K. Franklin
IFIP
2009
Springer
13 years 8 months ago
Specification and Verification of Side Channel Declassification
Side channel attacks have emerged as a serious threat to the security of both networked and embedded systems
Josef Svenningsson, David Sands
ICASSP
2011
IEEE
13 years 2 months ago
Secrecy capacity and secure outage performance for rayleigh fading simo channel
In this paper, we consider the problem of secret communication through Rayleigh fading single-input multiple-output (SIMO) broadcast channel in the presence of an eavesdropper. At...
Md. Zahurul I. Sarkar, Tharmalingam Ratnarajah
ISITA
2010
13 years 5 months ago
On attainment of the capacity of broadband quantum channel by wavelength division multiplexing
Recently, the exact solution of the capacity of an attenuated quantum channel which is a model of a long distance optical fiber channel was derived [V. Giovannetti, et al., Phys. R...
Yoshio Takamura, Shogo Usami, Tsuyoshi Sasaki Usud...