Sciweavers

315 search results - page 39 / 63
» Number Theoretic Attacks on Secure Password Schemes
Sort
View
ISW
2009
Springer
14 years 4 months ago
Towards Security Notions for White-Box Cryptography
Abstract. While code obfuscation attempts to hide certain characteristics of a program independently of an application, white-box cryptography (WBC) specifically focuses on softwa...
Amitabh Saxena, Brecht Wyseur, Bart Preneel
DEXAW
2002
IEEE
97views Database» more  DEXAW 2002»
14 years 2 months ago
Several Structures for Protecting the Routes of Mobile Agents Dispatched in Parallel
For mobile agents to be effective in practice, they have to be securely and efficiently deployed. In this paper, we propose and discuss several route structures and methods for mo...
Yan Wang 0002, Kian-Lee Tan, Xiaolin Pang
CANS
2007
Springer
154views Cryptology» more  CANS 2007»
14 years 3 months ago
Forward-Secure Key Evolution in Wireless Sensor Networks
We consider a key distribution scheme for securing node-to-node communication in sensor networks. While most schemes in use are based on random predistribution, we consider a syste...
Marek Klonowski, Miroslaw Kutylowski, Michal Ren, ...
PKC
2000
Springer
166views Cryptology» more  PKC 2000»
14 years 1 months ago
Design Validations for Discrete Logarithm Based Signature Schemes
A number of signature schemes and standards have been recently designed, based on the Discrete Logarithm problem. In this paper we conduct design validation of such schemes while t...
Ernest F. Brickell, David Pointcheval, Serge Vaude...
CISS
2008
IEEE
14 years 4 months ago
MIMO-assisted channel-based authentication in wireless networks
— Multiple-input multiple-output (MIMO) techniques allow for multiplexing and/or diversity gain, and will be widely deployed in future wireless systems. In this paper, we propose...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...