Sciweavers

CISC
2006
Springer
104views Cryptology» more  CISC 2006»
13 years 8 months ago
Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes
Abstract. A public-key cryptosystem is usually used for key management, in particular to session key management. The paper presents a method for handling a batch of concurrent keys...
Yongdong Wu, Feng Bao
FC
2010
Springer
181views Cryptology» more  FC 2010»
13 years 9 months ago
Design and Implementation of a Key-Lifecycle Management System
Key management is the Achilles’ heel of cryptography. This work presents a novel Key-Lifecycle Management System (KLMS), which addresses two issues that have not been addressed ...
Mathias Björkqvist, Christian Cachin, Robert ...
CCS
2007
ACM
13 years 9 months ago
Efficient techniques for realizing geo-spatial access control
The problem of key management for access control systems has been well-studied, and the literature contains several schemes for hierarchy-based and temporal-based access control. ...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
MMMACNS
2001
Springer
13 years 9 months ago
Dynamic Group Key Management Protocol
If multicast communication appears as the most efficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as...
Ghassan Chaddoud, Isabelle Chrisment, André...
GI
2001
Springer
13 years 9 months ago
A Simple Key Distribution Method for IEEE 802.11 Encryption Keys
This article proposes a simple key management protocol for the distribution of shared session keys in IEEE 802.11 wireless LANs. For this purpose an individual key for each user i...
Günter Schäfer, Michael Eyrich
SASN
2004
ACM
13 years 10 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
ISSADS
2005
Springer
13 years 10 months ago
Overview the Key Management in Ad Hoc Networks
The aim of this paper is to show some solutions for key management in ad hoc networks. The major problem in providing security services in such infrastructure less networks is how...
Gerardo del Valle, Roberto Gómez Cár...
WS
2005
ACM
13 years 10 months ago
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs i...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
ITCC
2005
IEEE
13 years 10 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
IPCCC
2005
IEEE
13 years 10 months ago
SECK: survivable and efficient clustered keying for wireless sensor networks
A wireless sensor network (WSN) typically consists of a large number of small sensor nodes and one or more highend control and data aggregation nodes. Sensor nodes have limited co...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...