Sciweavers

1834 search results - page 55 / 367
» Public Key Cryptography
Sort
View
DCOSS
2006
Springer
14 years 1 months ago
Distributed User Access Control in Sensor Networks
User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network depl...
Haodong Wang, Qun Li
JCIT
2007
142views more  JCIT 2007»
13 years 10 months ago
Distributed Certification Authority for Mobile Ad Hoc Networks - A Dynamic Approach
A Mobile Ad Hoc Network (MANET) is an infrastructureless network of wireless mobile nodes that cooperate among each other to maintain connectivity of the network. In comparison to...
Sanjay Raghani, Durga Toshniwal
IACR
2011
161views more  IACR 2011»
12 years 9 months ago
Roots of Square: Cryptanalysis of Double-Layer Square and Square+
Abstract. Square is a multivariate quadratic encryption scheme proposed in 2009. It is a specialization of Hidden Field Equations by using only odd characteristic elds and also X2...
Enrico Thomae, Christopher Wolf
PODC
2003
ACM
14 years 3 months ago
Cryptography and competition policy: issues with 'trusted computing'
The most significant strategic development in information technology over the past year has been ‘trusted computing’. This is popularly associated with Microsoft’s ‘Pallad...
Ross J. Anderson
PKC
2005
Springer
67views Cryptology» more  PKC 2005»
14 years 3 months ago
Symmetric Subgroup Membership Problems
Abstract. We define and discuss symmetric subgroup membership problems and their properties, including a relation to the Decision DiffieHellman problem. We modify the Cramer-Shoup...
Kristian Gjøsteen