Sciweavers

446 search results - page 5 / 90
» Who's Got the Key
Sort
View
JUCS
2006
89views more  JUCS 2006»
13 years 7 months ago
Process Equivalences as Global Bisimulations
: Bisimulation can be defined in a simple way using coinductive methods, and has rather pleasant properties. Ready similarity was proposed by Meyer et al. as a way to weakening the...
David de Frutos-Escrig, Carlos Gregorio-Rodr&iacut...
SIGMOD
2004
ACM
133views Database» more  SIGMOD 2004»
14 years 7 months ago
Robust key establishment in sensor networks
Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research problem since asymmetric key cryptosy...
Yongge Wang
ISWC
2000
IEEE
13 years 11 months ago
Wearable Key: Device for Personalizing Nearby Environment
This paper describes a system that allows users who obtain a “wearable ID key” to personalize dynamically ubiquitous computers by simply touching them. We call the concept of ...
Nobuyuki Matsushita, Shigeru Tajima, Yuji Ayatsuka...
ASPDAC
2004
ACM
103views Hardware» more  ASPDAC 2004»
13 years 10 months ago
Design and implementation of a secret key steganographic micro-architecture employing FPGA
In the well-known "prisoners' problem", a representative example of steganography, two persons attempt to communicate covertly without alerting the warden. One appr...
Hala A. Farouk, Magdy Saeb
FSE
2004
Springer
150views Cryptology» more  FSE 2004»
14 years 11 days ago
Ciphers Secure against Related-Key Attacks
Abstract. In a related-key attack, the adversary is allowed to transform the secret key and request encryptions of plaintexts under the transformed key. This paper studies the secu...
Stefan Lucks