Sciweavers

ICICS
2010
Springer
13 years 9 months ago
Manger's Attack Revisited
In this work we examine a number of different open source implementations of the RSA Optimal Asymmetric Encryption Padding (OAEP) and generally RSA with respect to the message-aime...
Falko Strenzke
ICICS
2010
Springer
13 years 9 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
ICICS
2010
Springer
13 years 9 months ago
Fine-Grained Disclosure of Access Policies
Abstract. In open scenarios, where servers may receive requests to access their services from possibly unknown clients, access control is typically based on the evaluation of (cert...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
ICICS
2010
Springer
13 years 9 months ago
Horizontal Correlation Analysis on Exponentiation
Christophe Clavier, Benoit Feix, Georges Gagnerot,...
ICICS
2010
Springer
13 years 9 months ago
Compromise-Resilient Anti-jamming for Wireless Sensor Networks
Abstract. Jamming is a kind of Denial-of-Service (DoS) attack in which an adversary purposefully emits radio frequency signals to corrupt wireless transmissions. Thus, the communic...
Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao
ICICS
2010
Springer
13 years 9 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
ICICS
2010
Springer
13 years 9 months ago
Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme
Due to the rapid growth of e-commerce technology, secure auction protocols have attracted much attention among researchers. The main reason for constructing sealed-bid auction prot...
Mehrdad Nojoumian, Douglas R. Stinson
GLOBECOM
2010
IEEE
13 years 9 months ago
Assessing the Impact of Geographically Correlated Failures on Overlay-Based Data Dissemination
Abstract--This paper addresses reliability of data dissemination applications when there are severe disruptions to the underlying physical infrastructure. Such massive simultaneous...
Kyungbaek Kim, Nalini Venkatasubramanian
GLOBECOM
2010
IEEE
13 years 9 months ago
Carrier Frequency Offset Estimation for Uplink OFDMA Using Partial FFT Demodulation
Fast and accurate Carrier Frequency Offset (CFO) estimation is a problem of significance in many multi-carrier modulation based systems, especially in uplink Orthogonal Frequency D...
Srinivas Yerramalli, Milica Stojanovic, Urbashi Mi...
GLOBECOM
2010
IEEE
13 years 9 months ago
Routing in Hybrid Mesh Networks of Cognitive and IEEE 802.11 Radios
Abstract--Cognitive radios (CRs) are devices that access spectrum opportunistically taking advantage of unused portions of licensed spectrum. Therefore, depending on the licensed r...
Marcel William Rocha da Silva, José Ferreir...