Sciweavers

849 search results - page 78 / 170
» Secure Applications of Low-Entropy Keys
Sort
View
EWSN
2004
Springer
14 years 9 months ago
Design of a Secure Distributed Service Directory for Wireless Sensornetworks
Sensor networks consist of a potentially huge number of very small and resource limited self-organizing devices. This paper presents the design of a general distributed service dir...
Erik-Oliver Blaß, Hans-Joachim Hof, Martina ...
FC
2006
Springer
99views Cryptology» more  FC 2006»
14 years 1 months ago
A Protocol for Secure Public Instant Messaging
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
Mohammad Mannan, Paul C. van Oorschot
IEEEHPCS
2010
13 years 8 months ago
Security, trust and risk in Digital Rights Management ecosystem
In the last decades, Digital Rights Management (DRM) technology has been laid emphasis on digital contents protection and related security policies, mechanisms and implementation....
Zhiyong Zhang
EUROPKI
2008
Springer
13 years 12 months ago
Efficient Generic Forward-Secure Signatures and Proxy Signatures
We propose a generic method to construct forward-secure signature schemes from standard signature schemes. The proposed construction is more computationally efficient than previous...
Basel Alomair, Krishna Sampigethaya, Radha Poovend...
CORR
2006
Springer
105views Education» more  CORR 2006»
13 years 10 months ago
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of know...
Emina Torlak, Marten van Dijk, Blaise Gassend, Dan...