Sciweavers

298 search results - page 41 / 60
» Strong Anonymous Signatures
Sort
View
IEEECIT
2010
IEEE
13 years 5 months ago
An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures
Abstract—In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploitin...
Rehana Yasmin, Eike Ritter, Guilin Wang
BIOCOMP
2006
13 years 8 months ago
Finding Molecular Signature of Prostate Cancer: An Algorithmic Approach
123 African American men in America are 65% more likely to develop prostate cancer and are two to three times more likely to die of the disease than Caucasian men [1]. While resear...
Patrick Bobbie, Renee Reams, Sandra Suther, C. Per...
TCC
2010
Springer
175views Cryptology» more  TCC 2010»
13 years 5 months ago
Obfuscation of Hyperplane Membership
Previous work on program obfuscation gives strong negative results for general-purpose obfuscators, and positive results for obfuscating simple functions such as equality testing (...
Ran Canetti, Guy N. Rothblum, Mayank Varia
CORR
2008
Springer
102views Education» more  CORR 2008»
13 years 7 months ago
SAFIUS - A secure and accountable filesystem over untrusted storage
We describe SAFIUS, a secure accountable file system that resides over an untrusted storage. SAFIUS provides strong security guarantees like confidentiality, integrity, prevention ...
V. Sriram, Ganesh M. Narayan, K. Gopinath
ACISP
2006
Springer
13 years 11 months ago
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered a...
Shidi Xu, Yi Mu, Willy Susilo