Sciweavers

1161 search results - page 102 / 233
» Group Message Authentication
Sort
View
113
Voted
ICDCS
2005
IEEE
15 years 8 months ago
A Dynamic Group Mutual Exclusion Algorithm Using Surrogate-Quorums
The group mutual exclusion problem extends the traditional mutual exclusion problem by associating a type with each critical section. In this problem, processes requesting critica...
Ranganath Atreya, Neeraj Mittal
CCS
2005
ACM
15 years 8 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
124
Voted
HUC
2010
Springer
15 years 3 months ago
Groupthink: usability of secure group association for wireless devices
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ers...
CCS
2001
ACM
15 years 7 months ago
Practical forward secure group signature schemes
A group signature scheme allows a group member to sign messages anonymously on behalf of the group, while in case of a dispute, a designated entity can reveal the identity of a si...
Dawn Xiaodong Song
INFOCOM
2010
IEEE
14 years 11 months ago
Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks
Body Area Networks (BAN) is a key enabling technology in E-healthcare such as remote health monitoring. An important security issue during bootstrap phase of the BAN is to securely...
Ming Li, Shucheng Yu, Wenjing Lou, Kui Ren