Sciweavers

20175 search results - page 3 / 4035
» Is abstraction the key to computing
Sort
View
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
14 years 4 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
14 years 5 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
HYBRID
2009
Springer
14 years 5 months ago
Computation of Discrete Abstractions of Arbitrary Memory Span for Nonlinear Sampled Systems
ion of discrete abstractions of arbitrary memory span for nonlinear sampled systems Gunther Reißig⋆ Technische Universit¨at Berlin, Fakult¨at Elektrotechnik und Informatik, He...
Gunther Reißig
APNOMS
2006
Springer
14 years 2 months ago
A Resource-Optimal Key Pre-distribution Scheme with Enhanced Security for Wireless Sensor Networks
Abstract. This paper proposes an efficient resource-optimal key predistribution scheme for providing improved security in wireless sensor networks. We exploit the advantages of two...
Tran Thanh Dai, Al-Sakib Khan Pathan, Choong Seon ...
COMCOM
2008
62views more  COMCOM 2008»
13 years 11 months ago
Secure multi-mode systems and their applications for pervasive computing
Submissions should include an abstract, 5-10 key words, and the e
Jong Hyuk Park, Hsiao-Hwa Chen, Antonio Coronato, ...