Sciweavers

7 search results - page 1 / 2
» ijisec 2010
Sort
View
IJISEC
2010
73views more  IJISEC 2010»
13 years 3 months ago
A new probabilistic rekeying method for secure multicast groups
Alwyn Roshan Pais, Shankar Joshi
IJISEC
2010
85views more  IJISEC 2010»
13 years 3 months ago
EXAM: a comprehensive environment for the analysis of access control policies
Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, ...
IJISEC
2010
121views more  IJISEC 2010»
13 years 3 months ago
Flowchart description of security primitives for controlled physical unclonable functions
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable and that behave like a random function when subjected to a challenge. Their use h...
Boris Skoric, Marc X. Makkes
IJISEC
2010
87views more  IJISEC 2010»
13 years 3 months ago
How to construct identity-based signatures without the key escrow problem
The inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by a...
Tsz Hon Yuen, Willy Susilo, Yi Mu
IJISEC
2010
150views more  IJISEC 2010»
13 years 2 months ago
Efficient online/offline identity-based signature for wireless sensor network
In this paper, we present an online/offline identity-based signature scheme for the wireless sensor network (WSN). We argue that due to significant reduction in costs of computati...
Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanji...