Sciweavers

241 search results - page 31 / 49
» Quantum Authenticated Key Distribution
Sort
View
SEC
2008
13 years 9 months ago
Role Signatures for Access Control in Open Distributed Systems
Implementing access control efficiently and effectively in an open and distributed system is a challenging problem. One reason for this is that users requesting access to remote re...
Jason Crampton, Hoon Wei Lim
WISEC
2009
ACM
14 years 2 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
ASPLOS
2006
ACM
14 years 1 months ago
SecCMP: a secure chip-multiprocessor architecture
Security has been considered as an important issue in processor design. Most of the existing mechanisms address security and integrity issues caused by untrusted main memory in si...
Li Yang, Lu Peng
DAC
2010
ACM
13 years 11 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
INFOCOM
2009
IEEE
14 years 2 months ago
Time Valid One-Time Signature for Time-Critical Multicast Data Authentication
Abstract—It is challenging to provide authentication to timecritical multicast data, where low end-to-end delay is of crucial importance. Consequently, it requires not only effi...
Qiyan Wang, Himanshu Khurana, Ying Huang, Klara Na...