Sciweavers

905 search results - page 8 / 181
» Public key distribution through
Sort
View
EUROCRYPT
2003
Springer
14 years 20 days ago
Resettable Zero-Knowledge in the Weak Public-Key Model
A new public-key model for resettable zero-knowledge (rZK) protocols, which is an extension and generalization of the upper-bounded public-key (UPK) model introduced by Micali and ...
Yunlei Zhao, Xiaotie Deng, Chan H. Lee, Hong Zhu
ASAP
2005
IEEE
96views Hardware» more  ASAP 2005»
14 years 1 months ago
On-Chip Lookup Tables for Fast Symmetric-Key Encryption
On public communication networks such as the Internet, data confidentiality can be provided by symmetric-key ciphers. One of the most common operations used in symmetric-key ciphe...
A. Murat Fiskiran, Ruby B. Lee
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 7 months ago
Key distribution in PKC through Quantas
Aditya Goel
IPPS
2007
IEEE
14 years 1 months ago
Authentication in Reprogramming of Sensor Networks for Mote Class Adversaries
Reprogramming is an essential service for wireless sensor networks. Authenticating reprogramming process is important as sensors need to verify that the code image is truly from a...
Limin Wang, Sandeep S. Kulkarni
VRML
1998
ACM
13 years 11 months ago
Visualization Products On-Demand Through the Web
We describe our efforts in providing REINAS (Realtime Environmental Information Network and Analysis System) weather visualization products on demand through the web. As the REINA...
Suzana Djurcilov, Alex Pang