Sciweavers

139 search results - page 10 / 28
» A Secure and Efficient Authenticated Diffie-Hellman Protocol
Sort
View
CCS
2003
ACM
15 years 1 months ago
LEAP: efficient security mechanisms for large-scale distributed sensor networks
We describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the ...
Sencun Zhu, Sanjeev Setia, Sushil Jajodia
102
Voted
IACR
2011
128views more  IACR 2011»
13 years 9 months ago
Identity-Based Cryptography for Cloud Security
—Cloud computing is a style of computing in which dynamically scalable and commonly virtualized resources are provided as a service over the Internet. This paper, first presents ...
Hongwei Li, Yuanshun Dai, Bo Yang
83
Voted
CSREASAM
2006
14 years 11 months ago
Efficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
Huang-Ju Chen, Jyh-Ming Huang, Lei Wang
72
Voted
IEEEARES
2007
IEEE
15 years 3 months ago
Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain
Assuring information authenticity is an important issue in the field of information security. A new broadcast authentication protocol is proposed. The protocol is based on time sy...
Bogdan Groza
80
Voted
IJNSEC
2008
146views more  IJNSEC 2008»
14 years 9 months ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li