Sciweavers

447 search results - page 18 / 90
» Mobile Secret Key Distribution with Network Coding
Sort
View
SIGCOMM
2012
ACM
11 years 10 months ago
RaptorStream: boosting mobile peer-to-peer streaming with raptor codes
As mobile devices and cellular networks become ubiquitous, first apps for popular P2P video streaming networks emerge. We have observed that when these applications operate in ce...
Philipp M. Eittenberger
ICQNM
2008
IEEE
178views Chemistry» more  ICQNM 2008»
14 years 1 months ago
A Quantum Network Manager that Supports a One-Time Pad Stream
We have begun to expand the NIST quantum key distribution (QKD) system into a quantum network to support secure cryptography. We are starting with a simple three-node network, one...
Alan Mink, Lijun Ma, Tassos Nakassis, Hai Xu, Oliv...
FSE
2003
Springer
123views Cryptology» more  FSE 2003»
14 years 22 days ago
The Security of "One-Block-to-Many" Modes of Operation
In this paper, we investigate the security, in the Luby-Rackoff security paradigm, of blockcipher modes of operation allowing to expand a one-block input into a longer t-block ou...
Henri Gilbert
ICASSP
2011
IEEE
12 years 11 months ago
Informed secure watermarking using optimal transport
This paper presents several watermarking methods preventing the estimation of the secret key by an adversary. The constraints for secure embedding using distribution matching, whe...
Patrick Bas
EUROPKI
2004
Springer
14 years 27 days ago
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification au...
Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Ros...