Sciweavers

338 search results - page 29 / 68
» A New Key Distribution Scheme for Secure Multicast Communica...
Sort
View
LCN
2008
IEEE
15 years 4 months ago
Key management in wireless sensor networks with inter-network sensor roaming
Wireless Sensor Networks (WSNs) have received considerable attention in recent years and opened up new possibilities for various commercial and industrial applications. A WSN cons...
S. Choi, V. Sarangan, S. Trost
CRYPTO
2005
Springer
127views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption
Secret-key agreement between two parties Alice and Bob, connected by an insecure channel, can be realized in an informationtheoretic sense if the parties share many independent pai...
Thomas Holenstein, Renato Renner
USENIX
1994
14 years 11 months ago
Key Management in an Encrypting File System
As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes i...
Matt Blaze
ICICS
2001
Springer
15 years 2 months ago
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication
Secure group communication with hierarchical access control refers to a scenario where a group of members is divided into a number of subgroups located at different privilege leve...
Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 4 months ago
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
We enrich the classical notion of group key exchange (GKE) protocols by a new property that allows each pair of users to derive an independent peer-to-peer (p2p) key on-demand and ...
Mark Manulis