Sciweavers

INFORMATICALT
2002
118views more  INFORMATICALT 2002»
13 years 4 months ago
Cryptanalysis and Improvement of Key Distribution System for VSAT Satellite Communications
Recently, Park and Lim (1998) proposed two key distribution systems for secure VSAT satellite communications. One provides indirect authentication, and another scheme enables that ...
Yuh-Min Tseng
COMCOM
2007
142views more  COMCOM 2007»
13 years 4 months ago
A survey of key management schemes in wireless sensor networks
Wireless sensor networks have many applications, vary in size, and are deployed in a wide variety of areas. They are often deployed in potentially adverse or even hostile environm...
Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang...
ATVA
2008
Springer
115views Hardware» more  ATVA 2008»
13 years 6 months ago
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
Guoqiang Li, Mizuhito Ogawa
DBISP2P
2006
Springer
71views Database» more  DBISP2P 2006»
13 years 8 months ago
Oscar: Small-World Overlay for Realistic Key Distributions
Abstract. The research on P2P systems which support skewed key distributions has rapidly advanced in the recent years. Yet, the assumptions on the skews we are dealing with remaine...
Sarunas Girdzijauskas, Anwitaman Datta, Karl Abere...
CCS
2001
ACM
13 years 9 months ago
Formalizing GDOI group key management requirements in NPATRL
Although there is a substantial amount of work on formal requirements for two and three-party key distribution protocols, very little has been done on requirements for group proto...
Catherine Meadows, Paul F. Syverson
WISEC
2010
ACM
13 years 9 months ago
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks
In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with...
Qi Mi, John A. Stankovic, Radu Stoleru
NSPW
2003
ACM
13 years 9 months ago
Public key distribution through "cryptoIDs"
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
Trevor Perrin
ESORICS
2004
Springer
13 years 10 months ago
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor dep...
Seyit Ahmet Çamtepe, Bülent Yener
INFOCOM
2006
IEEE
13 years 10 months ago
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks
— As the use of sensor networks increases, security in this domain becomes a very real concern. One fundamental aspect of providing confidentiality and authentication is key dis...
Matthew J. Miller, Nitin H. Vaidya
GLOBECOM
2006
IEEE
13 years 10 months ago
Bank Transfer over Quantum Channel with Digital Checks
- In recent years, many quantum cryptographic schemes have been proposed. However, it seems that there are many technical difficulties to realize them (except Quantum Key Distribut...
Yoshito Kanamori, Seong-Moo Yoo, Frederick T. Shel...