Sciweavers

3 search results - page 1 / 1
» Analysis and Improvement on a Contributory Group Key Exchang...
Sort
View
INFORMATICALT
2010
107views more  INFORMATICALT 2010»
13 years 1 months ago
Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique
Abstract. In 2008, based on the two-party Diffie
Yuh-Min Tseng, Tsu-Yang Wu
IJNSEC
2008
126views more  IJNSEC 2008»
13 years 4 months ago
A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying
We present a hybrid group key management protocol that incorporates both a centralized and a contributory scheme for key management, and a tree-based Elliptic Curve Diffie-Hellman...
Depeng Li, Srinivas Sampalli
ICIAR
2005
Springer
13 years 10 months ago
A Step Towards Practical Steganography Systems
There has been many hidden communication techniques proposed in the last few years. The focus was given to steganography to build such techniques. Utilizing stego-key(s) to hide se...
Abdelkader H. Ouda, Mahmoud R. El-Sakka