Sciweavers

Share
SCN
2008
Springer
9 years 2 months ago
An Identity-Based Key Agreement Protocol for the Network Layer
A new identity-based key agreement protocol designed to operate on thenetworklayerispresented. Endpoint addresses, namelyIP and MAC addresses, areusedaspublickeystoauthenticatethe ...
Christian Schridde, Matthew Smith, Bernd Freislebe...
CANS
2008
Springer
103views Cryptology» more  CANS 2008»
9 years 4 months ago
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks
Abstract. Wireless sensors are low power devices which are highly constrained in terms of computational capabilities, memory, and communication bandwidth. While battery life is the...
David Galindo, Rodrigo Roman, Javier Lopez
AINA
2009
IEEE
9 years 7 months ago
Identity-Based Cryptography for Securing Mobile Phone Calls
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to ...
Matthew Smith, Christian Schridde, Björn Agel...
CTRSA
2005
Springer
154views Cryptology» more  CTRSA 2005»
9 years 8 months ago
A New Two-Party Identity-Based Authenticated Key Agreement
We present a new two-party identity-based key agreement that is more eļ¬ƒcient than previously proposed schemes. It is inspired on a new identity-based key pair derivation algorith...
Noel McCullagh, Paulo S. L. M. Barreto
books