نتایج جستجو برای: random key representation

تعداد نتایج: 1030562  

2013
Wenjun LUO Xiaofang ZHANG

This article is described a new Public Key Encryption with Keyword Search (PEKS) scheme, which is semantically secure against chosen keyword attack, without assuming random oracle. The security of our scheme depends on the complexity assumption of Strong Diffie-Hellman (SDH). The computation operation for constructing cipher text and trapdoor of keyword is simpler than the most schemes introduc...

Journal: :J. Comput. Syst. Sci. 2011
Cristian S. Calude Nicholas J. Hay Frank Stephan

Article history: Received 5 June 2009 Received in revised form 25 July 2010 Accepted 4 August 2010 Available online 10 August 2010

2001
NEIL O’CONNELL

Let D0(R+ ) denote the space of cadlag paths f : R+ → R with f(0) = 0. For f, g ∈ D0(R+ ), define f ⊗ g ∈ D0(R+ ) and f g ∈ D0(R+ ) by (f ⊗ g)(t) = inf 0≤s≤t [f(s) + g(t) − g(s)], and (f g)(t) = sup 0≤s≤t [f(s) + g(t) − g(s)]. Unless otherwise deleniated by parentheses, the default order of operations is from left to right; for example, when we write f ⊗ g ⊗ h, we mean (f ⊗ g) ⊗ h. Define a seq...

Journal: :CoRR 2015
Jun Zhao Osman Yagan Virgil D. Gligor

Random key graphs represent topologies of secure wireless sensor networks that apply the seminal Eschenauer– Gligor random key predistribution scheme to secure communication between sensors. These graphs have received much attention and also been used in diverse application areas beyond secure sensor networks; e.g., cryptanalysis, social networks, and recommender systems. Formally, a random key...

1994
Ueli M. Maurer

Three parties, Alice, Bob and Eve, know the sequences of ran-generated by a discrete memoryless source according to some probability distribution P XY Z. Motivated by Wyner's and Csiszz ar and KK orner's pioneering definition of, and work on, the secrecy capacity of a broadcast channel, the secret key rate of P XY Z was deened by Maurer as the maximal rate M=N at which Alice and Bob can generat...

2009
Won-Jei Kim Jong-Keuk Lee Ji-Hong Kim Ki-Ryong Kwon

In this paper, we propose an efficient watermarking scheme for H.264/SVC, where the watermarking is performed by using a block-based approach. The embedding process of watermark in the proposed scheme is performed in the encoder of H.264/SVC. The blocks for watermarking embedding are selected by considering both the length of the watermark signal and the size of the input video frame. The water...

2003
Haowen Chan Adrian Perrig Dawn Song

Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because the nodes could be physically compromised by an adversary. We present three new mechanisms for key establishment using the framework of pre-distributing a random set of keys to each node. First, in the q-composite keys s...

2003
Haowen Chan Adrian Perrig Dawn Xiaodong Song

Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because the nodes could be physically compromised by an adversary. We present three new mechanisms for key establishment using the framework of pre-distributing a random set of keys to each node. First, in the q-composite keys s...

2009
Virgil D. Gligor

Random key graphs, also called uniform random intersection graphs, have been used for modeling a variety of different applications since their introduction in wireless sensor networks. In this paper, we review some of their recent applications and suggest several new ones, under the full visibility assumption; i.e., under the assumption that all nodes are within communication range of each othe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید