Sciweavers

1834 search results - page 187 / 367
» Public Key Cryptography
Sort
View
JSS
2011
106views more  JSS 2011»
13 years 5 days ago
A family of implementation-friendly BN elliptic curves
For the last decade, elliptic curve cryptography has gained increasing interest in industry and in the academic community. This is especially due to the high level of security it p...
C. C. F. Pereira Geovandro, Marcos A. Simplí...
NDSS
2002
IEEE
14 years 2 months ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...
IEEECIT
2005
IEEE
14 years 2 months ago
Identity Based Threshold Proxy Signcryption Scheme
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. ...
Meng Wang, Zhijing Liu
APNOMS
2006
Springer
14 years 1 months ago
Mixing Heterogeneous Address Spaces in a Single Edge Network
The growth of IPv4 Internet has been facing the infamous IP address depletion barrier. In practice, typical IPv4 Internet edge networks can be expanded by incorporating private add...
Ilhwan Kim, Heon Young Yeom
JUCS
2010
135views more  JUCS 2010»
13 years 7 months ago
Locating and Crawling eGovernment Services A Light-weight Semantic Approach
Abstract: The application of Web 2.0 tools and methodologies in the domain of eGovernment is not yet a fully exploited area due to the immaturity of the software support, and the l...
Luis Álvarez Sabucedo, Luis E. Anido-Rif&oa...