Sciweavers

525 search results - page 53 / 105
» Threshold Schemes with Disenrollment
Sort
View
IFIP
2005
Springer
14 years 3 months ago
A Logic for Analysing Subterfuge in Delegation Chains
Abstract. Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic cre...
Hongbin Zhou, Simon N. Foley
AWCC
2004
Springer
14 years 3 months ago
Securing Multicast Groups in Ad Hoc Networks
Group communication in multicast environment has been a growing importance in ad hoc networks, and providing secure communication in the group is essential in many ad hoc applicat...
Hartono Kurnio, Huaxiong Wang, Josef Pieprzyk, Kri...
SIAMDM
2010
114views more  SIAMDM 2010»
13 years 8 months ago
Rank-Based Attachment Leads to Power Law Graphs
Abstract. We investigate the degree distribution resulting from graph generation models based on rank-based attachment. In rank-based attachment, all vertices are ranked according ...
Jeannette Janssen, Pawel Pralat
ISAAC
2010
Springer
276views Algorithms» more  ISAAC 2010»
13 years 8 months ago
Anonymous Fuzzy Identity-Based Encryption for Similarity Search
Abstract. In this paper, we consider the problem of predicate encryption and focus on the predicate for testing whether the hamming distance between the attribute X of a data item ...
David W. Cheung, Nikos Mamoulis, W. K. Wong, Siu-M...
GLOBECOM
2009
IEEE
13 years 8 months ago
CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing
Collaborative spectrum sensing in cognitive radio networks has been proposed as an efficient way to improve the performance of primary users detection. In collaborative spectrum se...
Wenkai Wang, Husheng Li, Yan Sun, Zhu Han