Sciweavers

1054 search results - page 84 / 211
» Secret Communication with Feedback
Sort
View
MM
2000
ACM
112views Multimedia» more  MM 2000»
15 years 9 months ago
How to bypass the Wassenaar arrangement: a new application for watermarking
The scope of this article is to clarify the current legal and political situation related to electronic surveillance on the one hand, and to export regulations for encryption soft...
Franck Leprévost, Raphaël Erard, Toura...
ASIACRYPT
2000
Springer
15 years 8 months ago
Round-Efficient Conference Key Agreement Protocols with Provable Security
A conference key protocol allows a group of participants to establish a secret communication (conference) key so that all their communications thereafter are protected by the key. ...
Wen-Guey Tzeng, Zhi-Jia Tzeng
ACNS
2010
Springer
134views Cryptology» more  ACNS 2010»
15 years 5 months ago
Efficient and Secure Evaluation of Multivariate Polynomials and Applications
In this work, we design two-party and multiparty protocols for evaluating multivariate polynomials at participants' inputs with security against a malicious adversary who may ...
Matthew K. Franklin, Payman Mohassel
CN
2007
124views more  CN 2007»
15 years 4 months ago
Cryptographic techniques for mobile ad-hoc networks
In this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New ...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...
PIMRC
2010
IEEE
15 years 2 months ago
Transmission of common, public and confidential messages in broadcast channels with multiple antennas
Abstract-- We study the Gaussian multiple-input multipleoutput (MIMO) wiretap channel, which consists of a transmitter, a legitimate user, and an eavesdropper. In this channel, the...
Ersen Ekrem, Sennur Ulukus