Sciweavers

5891 search results - page 31 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
AIMS
2009
Springer
15 years 8 months ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...
144
Voted
CHES
2011
Springer
240views Cryptology» more  CHES 2011»
14 years 3 months ago
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
A lightweight and secure key storage scheme using silicon Physical Unclonable Functions (PUFs) is described. To derive stable PUF bits from chip manufacturing variations, a lightwe...
Meng-Day (Mandel) Yu, David M'Raïhi, Richard ...
PERCOM
2007
ACM
16 years 3 months ago
Securing distributed data storage and retrieval in sensor networks
Sensor networks have been an attractive platform for pervasive computing and communication. Due to the lack of physical protection, however, sensor networks are vulnerable to atta...
Nalin Subramanian, Chanjun Yang, Wensheng Zhang
84
Voted
ADT
2010
15 years 3 months ago
MUQAMI+: a scalable and locally distributed key management scheme for clustered sensor networks
Muhammad Khaliq-ur-Rahman Raazi Syed, Heejo Lee, S...
109
Voted
SACRYPT
2004
Springer
106views Cryptology» more  SACRYPT 2004»
15 years 9 months ago
Product Construction of Key Distribution Schemes for Sensor Networks
Ruizhong Wei, Jiang Wu