Sciweavers

338 search results - page 15 / 68
» A New Key Distribution Scheme for Secure Multicast Communica...
Sort
View
SCN
2010
Springer
122views Communications» more  SCN 2010»
14 years 8 months ago
A New Security Model for Authenticated Key Agreement
The Canetti–Krawczyk (CK) and extended Canetti–Krawczyk (eCK) security models, are widely used to provide security arguments for key agreement protocols. We discuss security s...
Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Cla...
GLOBECOM
2008
IEEE
15 years 4 months ago
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
Yong Hao, Yu Cheng, Kui Ren
SCN
2010
Springer
145views Communications» more  SCN 2010»
14 years 8 months ago
Distributed Private-Key Generators for Identity-Based Cryptography
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
Aniket Kate, Ian Goldberg
AMC
2005
218views more  AMC 2005»
14 years 9 months ago
Cryptanalysis of Lee-Hwang-Li's key authentication scheme
Abstract. Key authentication is very important in secret communications and data security. Recently, Lee, Hwang and Li proposed a new public key authentication scheme for cryptosys...
Fangguo Zhang, Kwangjo Kim
IPCCC
2006
IEEE
15 years 3 months ago
A framework for distributed key management schemes in heterogeneous wireless sensor networks
— Key management is a major challenge in the design and deployment of secure wireless sensor networks. A common assumption in most distributed key management schemes is that all ...
Kejie Lu, Yi Qian, Jiankun Hu