Sciweavers

154 search results - page 2 / 31
» Authenticity in a Reliable Protocol for Mobile Computing
Sort
View
IJNSEC
2008
126views more  IJNSEC 2008»
13 years 5 months ago
A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying
We present a hybrid group key management protocol that incorporates both a centralized and a contributory scheme for key management, and a tree-based Elliptic Curve Diffie-Hellman...
Depeng Li, Srinivas Sampalli
ICPADS
2005
IEEE
13 years 11 months ago
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access
In the audit process of Internet activities of users in a local area network, one of the most difficult problems is the problem of source authentication i.e. establishing securely...
Yusuf Uzunay, Kemal Bicakci
ESAS
2007
Springer
13 years 9 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
CSE
2009
IEEE
13 years 3 months ago
Social Authentication Protocol for Mobile Phones
Bijan Soleymani, Muthucumaru Maheswaran