Sciweavers

402 search results - page 22 / 81
» Public key protocols for wireless communications
Sort
View
WISEC
2010
ACM
14 years 25 days ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
CCS
2010
ACM
13 years 8 months ago
User-friendly matching protocol for online social networks
In this paper, we outline a privacy-preserving matching protocol for OSN (online social network) users to find their potential friends. With the proposed protocol, a logged-in use...
Qiang Tang
IACR
2011
196views more  IACR 2011»
12 years 7 months ago
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Gilad Asharov, Abhishek Jain, Daniel Wichs
EUC
2005
Springer
14 years 1 months ago
HMRP: Hierarchy-Based Multipath Routing Protocol for Wireless Sensor Networks
Wireless sensor networks comprise of small nodes with sensing, computation and wireless communication capabilities. The energy efficiency is a substantial key design issues in suc...
Ying-Hong Wang, Hung-Jen Mao, Chih-Hsiao Tsai, Chi...
MWCN
2004
Springer
14 years 1 months ago
Energy-Efficient Multimedia Communications in Lossy Multi-Hop Wireless Networks
Abstract A key concern in multi-hop wireless networks is energy-efficiency due to batterypower constrained mobile nodes. The network interface is a significant consumer of energy...
Albert F. Harris III, Cigdem Sengul, Robin Kravets...