Sciweavers

1190 search results - page 144 / 238
» Secure off-the-record messaging
Sort
View
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
15 years 11 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
ICALP
2007
Springer
15 years 10 months ago
Private Locally Decodable Codes
We consider the problem of constructing efficient locally decodable codes in the presence of a computationally bounded adversary. Assuming the existence of one-way functions, we c...
Rafail Ostrovsky, Omkant Pandey, Amit Sahai
IEEECIT
2005
IEEE
15 years 10 months ago
Identity Based Threshold Proxy Signcryption Scheme
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. ...
Meng Wang, Zhijing Liu
IH
2005
Springer
15 years 10 months ago
Compulsion Resistant Anonymous Communications
We study the effect compulsion attacks, through which an adversary can request a decryption or key from an honest node, have on the security of mix based anonymous communication s...
George Danezis, Jolyon Clulow
SIGOPSE
2004
ACM
15 years 10 months ago
AP3: cooperative, decentralized anonymous communication
This paper describes a cooperative overlay network that provides anonymous communication services for participating users. The Anonymizing Peer-to-Peer Proxy (AP3) system provides...
Alan Mislove, Gaurav Oberoi, Ansley Post, Charles ...