lavarefa.blogg.se

Wuala cbfs
Wuala cbfs






wuala cbfs wuala cbfs

In Proceedings of the The Second Annual Inter- national Conference on Mobile and Ubiquitous Systems: Networking and Services, MOBIQUITOUS '05, pages 118-132, Washington, DC, USA, 2005. Practical broadcast authentication in sensor networks. Donggang Liu, Peng Ning, Sencun Zhu, and Sushil Jajodia. Multilevel μtesla: Broadcast authentication for distributed sensor networks. In MobiCom '01: Proceedings of the 7th annual international conference on Mobile computing and networking, pages 189- 199, New York, NY, USA, 2001. SPINS: security protocols for sensor networks. Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J. In Financial Cryptography, Second International Conference, FC '98, pages 172-177, 1998. On certificate revocation and validation. In DARPA Information Survivability Conference And Exposition, pages 68-82. Implementation of an authenticated dictionary with skip lists and commutative hashing. Goodrich, Roberto Tamassia, and Andrew Schwerin. Efficient authenticated dictionaries with skip lists and commutative hashing. Authenticated dictionaries: Real-world costs and trade-offs. In Proceedings of the 7th conference on USENIX Security Symposium - Volume 7, SSYM'98, pages 17-17, Berkeley, CA, USA, 1998. Certificate revocation and certificate update. In International Conference on Security and Privacy in Communication Networks (SecureComm), pages 248-252, 2009. Aggregated authentication (AMAC) using universal hash functions. Wassim Znaidi, Marine Minier, and Cêdric Lauradoux. In Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, volume 4964 of LNCS, pages 155-169. In Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, pages 416-432, 2003. Aggregate and verifiably encrypted signatures from bilinear maps. Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham.








Wuala cbfs