Sciweavers

225 search results - page 27 / 45
» Weakly-Private Secret Sharing Schemes
Sort
View
SASN
2006
ACM
14 years 1 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
NTMS
2009
IEEE
14 years 2 months ago
An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements
—New approaches that generate secret keys from radio channel characteristics have been recently proposed. The security of these schemes usually relies on the reciprocity principl...
Sana Tmar Ben Hamida, Jean-Benoît Pierrot, C...
ASIACRYPT
2000
Springer
13 years 12 months ago
Improved Methods to Perform Threshold RSA
Abstract. A t out of n threshold scheme is such that shares are distributed to n participants so that any set of t participants can compute the secret, whereas any set of less than...
Brian King
TDSC
2008
121views more  TDSC 2008»
13 years 7 months ago
Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission
In random key predistribution techniques for wireless sensor networks, a relatively small number of keys are randomly chosen from a large key pool and are loaded on the sensors pri...
Jing Deng, Yunghsiang S. Han
TIFS
2010
130views more  TIFS 2010»
13 years 2 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena