Sciweavers

340 search results - page 59 / 68
» Two-Party Computing with Encrypted Data
Sort
View
PERCOM
2007
ACM
14 years 7 months ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 2 months ago
A Very Compact "Perfectly Masked" S-Box for AES
Implementations of the Advanced Encryption Standard (AES), including hardware applications with limited resources (e.g., smart cards), may be vulnerable to ā€œside-channel attacksā...
D. Canright, Lejla Batina
EDOC
2006
IEEE
14 years 1 months ago
Secure Dissemination of XML Content Using Structure-based Routing
The paper proposes an approach to content dissemination that exploits the structural properties of XML Document Object Model in order to provide efļ¬cient dissemination by at the...
Ashish Kundu, Elisa Bertino
MMMACNS
2005
Springer
14 years 1 months ago
Unique User-Generated Digital Pseudonyms
Abstract. This paper presents a method to generate unique and nevertheless highly random pseudonyms in a distributed environment. More precisely, each user can now generate his pse...
Peter Schartner, Martin Schaffer
NSPW
2003
ACM
14 years 26 days ago
Public key distribution through "cryptoIDs"
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
Trevor Perrin