Sciweavers

688 search results - page 1 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
OTM
2007
Springer
13 years 11 months ago
Network Coding Protocols for Secret Key Distribution
Abstract. Recent contributions have uncovered the potential of network coding, i.e. algebraic mixing of multiple information flows in a network, to provide enhanced security in pa...
Paulo F. Oliveira, João Barros
TIFS
2008
208views more  TIFS 2008»
13 years 4 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
SECRYPT
2007
100views Business» more  SECRYPT 2007»
13 years 6 months ago
Mobile Secret Key Distribution with Network Coding
Paulo F. Oliveira, Rui A. Costa, João Barro...
WISEC
2010
ACM
13 years 9 months ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
JCSS
2006
102views more  JCSS 2006»
13 years 4 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh