Sciweavers

12 search results - page 1 / 3
» The BiBa one-time signature and broadcast authentication pro...
Sort
View
CCS
2001
ACM
13 years 9 months ago
The BiBa one-time signature and broadcast authentication protocol
Ï ÒØÖÓ Ù Ø × Ò ØÙÖ × Ñ ¸ Ò Û × Ò ØÙÖ ÓÒ×ØÖÙ Ø ÓÒ Ø Ø Ù× × ÓÒ ¹Û Ý ÙÒ Ø ÓÒ× Û Ø ÓÙØ ØÖ Ô ÓÓÖ׺ ØÙÖ × ÐÓÛ Ú Ö ¬...
Adrian Perrig
JNW
2006
149views more  JNW 2006»
13 years 4 months ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo
CCS
2006
ACM
13 years 8 months ago
An efficient broadcast authentication scheme in wireless sensor networks
A broadcast authentication mechanism is important in wireless sensor networks, assuring receivers of a packet's validity. To provide authentication, some researchers utilize ...
Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, ...
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
13 years 11 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
13 years 2 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig