Sciweavers

773 search results - page 17 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
NBIS
2009
Springer
14 years 4 months ago
Challenges in the Development of Mobile Applications in Industrial Field Service
Utilizing mobile applications in the area of industrial field service promises several benefits, especially improved process support providing tailored service information and p...
Markus Aleksy, Bernd Stieger
ICCSA
2007
Springer
14 years 3 months ago
Provably Secure Framework for Information Aggregation in Sensor Networks
Information aggregation is an important operation in wireless sensor networks executed for the purpose of monitoring and reporting of the environmental data. Due to the performance...
Mark Manulis, Jörg Schwenk
LICS
2003
IEEE
14 years 2 months ago
Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or
We present decidability results for the verification of cryptographic protocols in the presence of equational theories corresponding to xor and Abelian groups. Since the perfect ...
Hubert Comon-Lundh, Vitaly Shmatikov
ACNS
2011
Springer
237views Cryptology» more  ACNS 2011»
13 years 1 months ago
Private Discovery of Common Social Contacts
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. One common p...
Emiliano De Cristofaro, Mark Manulis, Bertram Poet...
COMCOM
2008
147views more  COMCOM 2008»
13 years 9 months ago
Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems
A new kind of ad hoc network is hitting the streets: Vehicular Ad Hoc Networks (VANets). In these networks, vehicles communicate with each other and possibly with a roadside infra...
Azzedine Boukerche, Horacio A. B. F. de Oliveira, ...