Sciweavers

74 search results - page 1 / 15
» Using Compatible Keys for Secure Multicasting in E-Commerce
Sort
View
LCN
2005
IEEE
13 years 10 months ago
Secure Content Delivery using Key Composition
In this paper, we propose a novel framework for secure multicast on overlay networks. Our contributions are threefold: 1) a technique key composition is proposed to cope with the ...
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Hann...
ACISP
2001
Springer
13 years 9 months ago
Elliptic Curve Cryptography on a Palm OS Device
The market for Personal Digital Assistants (PDA) is growing rapidly and PDAs are becoming increasingly interesting for commercial transactions. One requirement for further growing ...
André Weimerskirch, Christof Paar, Sheuelin...
IJNSEC
2006
270views more  IJNSEC 2006»
13 years 5 months ago
Efficient Key Agreement for Large and Dynamic Multicast Groups
Secure multicast represents the core component of many web and multimedia applications such as pay-TV, teleconferencing, real-time distribution of stock market price and etc. The ...
Liming Wang, Chuan-Kun Wu
SIGECOM
1999
ACM
105views ECommerce» more  SIGECOM 1999»
13 years 9 months ago
Nark: receiver-based multicast non-repudiation and key management
The goal of this work is to separately control individual secure sessions between unlimited pairs of multicast receivers and senders while preserving the scalability of receiver i...
Bob Briscoe, Ian Fairman