Sciweavers

5891 search results - page 166 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
ENTCS
2008
146views more  ENTCS 2008»
15 years 4 months ago
An Application-Oriented Framework for Wireless Sensor Network Key Establishment
The term wireless sensor network is applied broadly to a range of significantly different networking environments. On the other hand there exists a substantial body of research on...
Keith M. Martin, Maura B. Paterson
CRYPTO
2008
Springer
132views Cryptology» more  CRYPTO 2008»
15 years 6 months ago
Public-Key Locally-Decodable Codes
In this paper we introduce the notion of a Public-Key Encryption Scheme that is also a Locally-Decodable Error-Correcting Code (PKLDC). In particular, we allow any polynomialtime ...
Brett Hemenway, Rafail Ostrovsky
IPPS
2005
IEEE
15 years 10 months ago
Job Allocation Schemes in Computational Grids Based on Cost Optimization
In this paper we propose two price-based job allocation schemes for computational grids. A grid system tries to solve problems submitted by various grid users by allocating the jo...
Satish Penmatsa, Anthony T. Chronopoulos
TIT
2010
150views Education» more  TIT 2010»
14 years 11 months ago
Information-theoretic key agreement of multiple terminals: part I
This is the first part of a two-part paper on information-theoretically secure secret key agreement. In this part, we study the secrecy problem under the widely studied source mod...
Amin Aminzadeh Gohari, Venkat Anantharam
ACSAC
2006
IEEE
15 years 10 months ago
Shamon: A System for Distributed Mandatory Access Control
We define and demonstrate an approach to securing distributed computation based on a shared reference monitor (Shamon) that enforces mandatory access control (MAC) policies acros...
Jonathan M. McCune, Trent Jaeger, Stefan Berger, R...