Sciweavers

3088 search results - page 219 / 618
» Multichannel Security Protocols
Sort
View
CRYPTO
2008
Springer
123views Cryptology» more  CRYPTO 2008»
14 years 2 days ago
Collusion-Free Protocols in the Mediated Model
Prior approaches [15, 14] to building collusion-free protocols require exotic channels. By taking a conceptually new approach, we are able to use a more digitally-friendly communic...
Joël Alwen, Abhi Shelat, Ivan Visconti
ESORICS
2012
Springer
12 years 20 days ago
Formal Analysis of Privacy in an eHealth Protocol
Given the sensitive nature of health data, privacy of eHealth systems is of prime importance. An eHealth system must enforce that users remain private, even if they are bribed or c...
Naipeng Dong, Hugo Jonker, Jun Pang
IEEEARES
2008
IEEE
14 years 4 months ago
RTQG: Real-Time Quorum-based Gossip Protocol for Unreliable Networks
We consider scheduling real-time tasks in the presence of message loss and Byzantine node failures in unreliable networks. We present scheduling algorithms called RTQG and RTQG-B....
Bo Zhang, Kai Han, Binoy Ravindran, E. Douglas Jen...
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 4 months ago
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol
We propose a light-weight protocol for authentication of low-power devices. Our construction PUF-HB merges the positive qualities of two families of authentication functions. PUF ...
Ghaith Hammouri, Berk Sunar
IPCCC
2005
IEEE
14 years 3 months ago
Source routing based pairwise key establishment protocol for sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. The establishment...
D. Huang, M. Mehta, D. Medhi