Sciweavers

674 search results - page 17 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
ICNS
2006
IEEE
15 years 5 months ago
Efficient Network Management System with DACS Scheme
Kazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi...
MOBISYS
2006
ACM
15 years 11 months ago
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
The majority of security schemes available for sensor networks assume deployment in areas without access to a wired infrastructure. More specifically, nodes in these networks are ...
Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guo...
ACNS
2003
Springer
156views Cryptology» more  ACNS 2003»
15 years 3 months ago
An Efficient Tree-Based Group Key Agreement Using Bilinear Map
Secure and reliable group communication is an increasingly active research area by growing popularity in group-oriented and collaborative application. One of the important challeng...
Sangwon Lee, Yongdae Kim, Kwangjo Kim, DaeHyun Ryu
IJNSEC
2008
147views more  IJNSEC 2008»
14 years 11 months ago
Constructing Efficient Certificateless Public Key Encryption with Pairing
Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. Recently, Yum1 and Lee have proposed a generic ser...
Yijuan Shi, Jianhua Li, Jianjun Shi
IJNSEC
2008
145views more  IJNSEC 2008»
14 years 11 months ago
Efficient User Authentication and Key Agreement with User Privacy Protection
Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to use...
Wen-Shenq Juang, Jing-Lin Wu