Sciweavers

100 search results - page 1 / 20
» Public Key Authentication Schemes for Local Area Networks
Sort
View
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
13 years 4 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
APNOMS
2006
Springer
13 years 8 months ago
An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks
Abstract. Recently the concept of personal PKI was introduced to describe a public key infrastructure specifically designed to support the distribution of public keys in a personal...
Chul Sur, Kyung Hyune Rhee
IJSN
2006
116views more  IJSN 2006»
13 years 4 months ago
A lightweight encryption and authentication scheme for wireless sensor networks
: The research of Wireless Sensor Networks (WSNs) has recently received a strong boost from IEEE 802.15.4 task group, which focuses on the specifications for low rate wireless pers...
Jianliang Zheng, Jie Li, Myung J. Lee, Michael Ans...
MOBIHOC
2005
ACM
14 years 4 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning
PERCOM
2007
ACM
14 years 4 months ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...