Sciweavers

1161 search results - page 69 / 233
» Group Message Authentication
Sort
View
97
Voted
IJNSEC
2007
156views more  IJNSEC 2007»
15 years 19 days ago
Another Look at PMAC
We can view an existing Message Authentication Code (MAC) as a Carter-Wegman MAC in spite of the fact it may not have been designed as one. This will make the analysis easier than...
Dayin Wang, Dongdai Lin, Wenling Wu
85
Voted
ACNS
2005
Springer
134views Cryptology» more  ACNS 2005»
15 years 6 months ago
Dynamic k-Times Anonymous Authentication
k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has applicat...
Lan Nguyen, Reihaneh Safavi-Naini
84
Voted
SIGOPSE
1990
ACM
15 years 4 months ago
Fault tolerance using group communication
We propose group communication as an efficient mechanism to support fault tolerance. Our approach is based on an efficient reliable broadcast protocol that requires on average onl...
M. Frans Kaashoek, Andrew S. Tanenbaum
WISEC
2009
ACM
15 years 7 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
88
Voted
IJNSEC
2008
103views more  IJNSEC 2008»
15 years 21 days ago
General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security
A scheme for general group oriented ID-based cryptosystems is proposed. This scheme allows an authorized subset in the general access structure to cooperatively decrypt the cipher...
Chunxiang Xu, Junhui Zhou, Guozhen Xiao