Skip to search formSkip to main contentSkip to account menu

Provable security

Known as: Provable, Provably secure, Security proof 
Provable security refers to any type or level of security that can be proved. It is used in different ways by different fields. Usually, this refers… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
In traditional authentication schemes for access control in mobile pay-TV systems, one-to-one delivery is used, i.e., one… 
Highly Cited
2012
Highly Cited
2012
Wireless Sensor Networks (WSNs) have acquired new features recently, i.e., both the sensor and the antenna of a node can be… 
2012
2012
For an increased level of scalability, availability and durability, some customers may want their data to be replicated on… 
Highly Cited
2012
Highly Cited
2012
Abstract We investigate parametric interval linear systems of equations. The main result is a generalization of the Bauer–Skeel… 
Highly Cited
2010
Highly Cited
2010
  • M. Dinitz
  • 2010
  • Corpus ID: 11366805
In this paper we consider the problem of maximizing wireless network capacity (a.k.a. one-shot scheduling) in both the protocol… 
Highly Cited
2009
Highly Cited
2009
The recent interest in outsourcing IT services onto the cloud raises two main concerns: security and cost. One task that could be… 
Highly Cited
2009
Highly Cited
2009
This paper considers two-way relaying systems with a multiple-input multiple-output (MIMO) relay between two MIMO terminal nodes… 
2005
2005
This article deals with topological concepts and models which are necessary to represent three-dimensional urban objects in a… 
Highly Cited
2004
Highly Cited
2004
A family of unequal error-protection (UEP) low-density parity-check (LDPC) codes, based on Plotkin-type constructions, is… 
1994
1994
An approach is presented for exploring an unknown, arbitrary surface in three-dimensional (3D) space by a mobile robot. The main…