Sciweavers

5 search results - page 1 / 1
» A Message Authentication Code Based on Unimodular Matrix Gro...
Sort
View
CRYPTO
2003
Springer
98views Cryptology» more  CRYPTO 2003»
13 years 10 months ago
A Message Authentication Code Based on Unimodular Matrix Groups
We present a new construction based on modular groups. A novel element of our construction is to embed each input into a sequence of matrices with determinant ±1, the product of w...
Matthew Cary, Ramarathnam Venkatesan
IJNSEC
2007
122views more  IJNSEC 2007»
13 years 4 months ago
Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings
Deniable authentication protocol is different from traditional authentication protocol in that the intended receiver can authenticate the source of a given message, but cannot pr...
Rongxing Lu, Zhenfu Cao
CJ
2006
123views more  CJ 2006»
13 years 5 months ago
Unconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However, they will be meaningless if cryptographic prim...
Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, H...
ICCSA
2010
Springer
13 years 11 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim
TMC
2012
11 years 7 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...