Sciweavers

977 search results - page 33 / 196
» Secret image sharing
Sort
View
TIFS
2008
208views more  TIFS 2008»
15 years 4 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
CORR
2011
Springer
224views Education» more  CORR 2011»
14 years 11 months ago
A Broadcast Approach To Secret Key Generation Over Slow Fading Channels
Abstract—A secret-key generation scheme based on a layered broadcasting strategy is introduced for slow-fading channels. In the model considered, Alice wants to share a key with ...
Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, H. ...
SCN
2008
Springer
141views Communications» more  SCN 2008»
15 years 4 months ago
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
In 2004, Molnar and Wagner introduced a very appealing scheme dedicated to the identification of RFID tags. Their protocol relies on a binary tree of secrets which are shared
Julien Bringer, Hervé Chabanne, Thomas Icar...
EUROCRYPT
2009
Springer
16 years 4 months ago
Key Agreement from Close Secrets over Unsecured Channels
We consider information-theoretic key agreement between two parties sharing somewhat different versions of a secret w that has relatively little entropy. Such key agreement, also ...
Bhavana Kanukurthi, Leonid Reyzin
AINA
2004
IEEE
15 years 8 months ago
Supervising Secret-Key Agreements in a Level-Based Hierarchy
A key agreement protocol is utilized in a network system such that two users are able to establish a commonly shared secret key. Entities within the same security level can commun...
Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang