Sciweavers

563 search results - page 55 / 113
» Verifiable Signature Sharing
Sort
View
CCS
2010
ACM
14 years 3 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
ICC
2008
IEEE
119views Communications» more  ICC 2008»
14 years 3 months ago
Wavelet-Based SNR Analysis in Building Satellite Terminal Fault Identification System
—With the rapid expansion of satellite communication, an increasing number of unattended ground terminals are spreading out to serve local customers. And there is a great demand ...
Liang Xu, Changcheng Huang
ICDCSW
2007
IEEE
14 years 3 months ago
Exploring Symmetric Cryptography for Secure Network Reprogramming
Recent secure code-update protocols for sensor networks have been based on asymmetric-crypto primitives such as digital signatures. Our approach, Castor, explores the feasibility ...
Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan
ICMCS
2007
IEEE
100views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Sensor Forensics: Printers, Cameras and Scanners, They Never Lie
Forensic characterization of devices is important in many situations such as establishing the trust and verifying authenticity of data and the device that created it. Current fore...
Nitin Khanna, Aravind K. Mikkilineni, Pei-Ju Chian...
FPL
2009
Springer
105views Hardware» more  FPL 2009»
14 years 1 months ago
Improving the quality of a Physical Unclonable Function using configurable Ring Oscillators
A silicon Physical Unclonable Function (PUF), which is a die-unique challenge-response function, is an emerging hardware primitive for secure applications. It exploits manufacturi...
Abhranil Maiti, Patrick Schaumont