Sciweavers

1834 search results - page 1 / 367
» Public Key Cryptography
Sort
View
CIS
2007
Springer
14 years 12 days ago
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the internet. However, SIP authentication typically uses HTTP digest authentic...
Fengjiao Wang, Yuqing Zhang
IH
2009
Springer
14 years 23 days ago
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
Abstract. A physically unclonable function (PUF) is a multiple-input, multipleoutput, large entropy physical system that is unreproducible due to its structural complexity. A publi...
Nathan Beckmann, Miodrag Potkonjak
IDTRUST
2009
ACM
14 years 1 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper
GLOBECOM
2010
IEEE
13 years 4 months ago
Secure Cooperation Incentive Scheme with Limited Use of Public Key Cryptography for Multi-Hop Wireless Network
Abstract-Secure cooperation incentive schemes usually use public key cryptography, which incur too heavy overhead to be used efficiently in limited-resource nodes. In this paper, w...
Mohamed Elsalih Mahmoud, Xuemin Shen
PERCOM
2007
ACM
14 years 5 months ago
Public-Key Cryptography for RFID-Tags
Lejla Batina, Jorge Guajardo, Tim Kerins, Nele Men...