Sciweavers

674 search results - page 10 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
TC
2008
14 years 9 months ago
On the Computational Security of a Distributed Key Distribution Scheme
In a distributed key distribution scheme, a set of servers help a set of users in a group to securely obtain a common key. Security means that an adversary who corrupts some server...
Vanesa Daza, Javier Herranz, Germán S&aacut...
EUC
2005
Springer
15 years 3 months ago
An Integrated Scheme for Address Assignment and Service Location in Pervasive Environments
We propose an efficient scheme called CoReS (Configuration and Registration Scheme) that integrates address assignment and service location for ad hoc networks prevalent in pervasi...
Mijeom Kim, Mohan Kumar, Behrooz Shirazi
ESORICS
2006
Springer
15 years 1 months ago
Secure Key-Updating for Lazy Revocation
Abstract. We consider the problem of efficient key management and user revocation in cryptographic file systems that allow shared access to files. A performanceefficient solution t...
Michael Backes, Christian Cachin, Alina Oprea
USENIX
1994
14 years 11 months ago
Key Management in an Encrypting File System
As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes i...
Matt Blaze
IJNSEC
2011
89views more  IJNSEC 2011»
14 years 4 months ago
A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy
Shen and Chen proposed a novel key management scheme for dynamic access control in a hierarchy. In this article, the authors shall present an improved version of Shen and Chen’s...
Shiang-Feng Tzeng, Cheng-Chi Lee, Tzu-Chun Lin