Sciweavers

674 search results - page 24 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
ESAS
2007
Springer
15 years 3 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
INFOCOM
2010
IEEE
14 years 7 months ago
Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks
Body Area Networks (BAN) is a key enabling technology in E-healthcare such as remote health monitoring. An important security issue during bootstrap phase of the BAN is to securely...
Ming Li, Shucheng Yu, Wenjing Lou, Kui Ren
83
Voted
ISCC
2005
IEEE
109views Communications» more  ISCC 2005»
15 years 3 months ago
From Mobility Management to Connectivity Management
This position paper presents the trend of the research focus transition from mobility management to connectivity management, for the emerging pervasive and ubiquitous computing pa...
Jun-Zhao Sun, Jaakko J. Sauvola
TCOS
2010
14 years 4 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
70
Voted
IPPS
2009
IEEE
15 years 4 months ago
Combating side-channel attacks using key management
Embedded devices are widely used in military and civilian operations. They are often unattended, publicly accessible, and thus vulnerable to physical capture. Tamper-resistant mod...
Donggang Liu, Qi Dong