Sciweavers

1449 search results - page 159 / 290
» Secure and Efficient Metering
Sort
View
PERCOM
2006
ACM
16 years 4 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
ISDA
2005
IEEE
15 years 10 months ago
IDEAS: Intrusion Detection based on Emotional Ants for Sensors
Due to the wide deployment of sensor networks recently security in sensor networks has become a hot research topic. Popular ways to secure a sensor network are by including crypto...
Soumya Banerjee, Crina Grosan, Ajith Abraham
FC
2006
Springer
147views Cryptology» more  FC 2006»
15 years 8 months ago
Timed-Release and Key-Insulated Public Key Encryption
In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release ...
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan...
ICISC
2004
173views Cryptology» more  ICISC 2004»
15 years 6 months ago
On Private Scalar Product Computation for Privacy-Preserving Data Mining
In mining and integrating data from multiple sources, there are many privacy and security issues. In several different contexts, the security of the full privacy-preserving data mi...
Bart Goethals, Sven Laur, Helger Lipmaa, Taneli Mi...
EUROCRYPT
2010
Springer
15 years 4 months ago
On the Impossibility of Three-Move Blind Signature Schemes
We investigate the possibility to prove security of the well-known blind signature schemes by Chaum, and by Pointcheval and Stern in the standard model, i.e., without random oracle...
Marc Fischlin, Dominique Schröder