Sciweavers

1251 search results - page 155 / 251
» On the security of group communication schemes
Sort
View
PKC
2010
Springer
161views Cryptology» more  PKC 2010»
13 years 10 months ago
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
ded abstract of this paper appears in 13th International Conference on Practice and Theory in Public Key Cryptography (PKC) 2010, Lecture Notes in Computer Science Vol. ?, P. Nguye...
Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Vi...
IEEESP
2006
130views more  IEEESP 2006»
13 years 8 months ago
Securing Embedded Systems
t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...
VTC
2006
IEEE
104views Communications» more  VTC 2006»
14 years 2 months ago
Low-Complexity Optimal Detection for Hybrid Space-Time Block Coding and Spatial Multiplexing
— The combination of space-time block codes (STBC) and spatial multiplexing (SM) schemes has the advantages of diversity gain and high data rate. For such STBC/SM hybrid systems,...
Yue Wu, Chintha Tellambura
TRUSTBUS
2005
Springer
14 years 1 months ago
A Multilateral Secure Payment System for Wireless LAN Hotspots
Beginning with the adoption of the de-facto standard for wireless LAN communications IEEE 802.11 in 1999 we can observe a continuous growth of public wireless LAN hotspots that pro...
Stephan Groß, Sabine Lein, Sandra Steinbrech...
INFOCOM
2008
IEEE
14 years 2 months ago
Towards Statistically Strong Source Anonymity for Sensor Networks
—For sensor networks deployed to monitor and report real events, event source anonymity is an attractive and critical security property, which unfortunately is also very difficu...
Min Shao, Yi Yang, Sencun Zhu, Guohong Cao