Sciweavers

25 search results - page 1 / 5
» iscc 2009
Sort
View
ISCC
2009
IEEE
129views Communications» more  ISCC 2009»
14 years 4 months ago
LWESP: Light-Weight Exterior Sensornet Protocol
Ángel Cuevas, Manuel Urueña, Annett ...
ISCC
2009
IEEE
170views Communications» more  ISCC 2009»
14 years 4 months ago
A directly public verifiable signcryption scheme based on elliptic curves
A directly public verifiable signcryption scheme is introduced in this paper that provides the security attributes of message confidentiality, authentication, integrity, non-repud...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
ISCC
2009
IEEE
149views Communications» more  ISCC 2009»
14 years 4 months ago
A secure variant of the Hill Cipher
The Hill cipher is a classical symmetric encryption algorithm that succumbs to the know-plaintext attack. Although its vulnerability to cryptanalysis has rendered it unusable in p...
Mohsen Toorani, Abolfazl Falahati
ISCC
2009
IEEE
130views Communications» more  ISCC 2009»
14 years 4 months ago
Context-aware publish-subscribe: Model, implementation, and evaluation
Complex communication patterns often need to take into account the situation in which the information to be communicated is produced or consumed. Publish-subscribe, and particular...
Gianpaolo Cugola, Alessandro Margara, Matteo Migli...