Sciweavers

20175 search results - page 144 / 4035
» Is abstraction the key to computing
Sort
View
WCNC
2008
IEEE
15 years 7 months ago
Anonymous ID-Based Group Key Agreement for Wireless Networks
—Popularity of group-oriented applications motivates research on security and privacy protection for group communications. A number of group key agreement protocols exploiting ID...
Zhiguo Wan, Kui Ren, Wenjing Lou, Bart Preneel
103
Voted
IJNSEC
2008
145views more  IJNSEC 2008»
15 years 24 days ago
Efficient User Authentication and Key Agreement with User Privacy Protection
Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to use...
Wen-Shenq Juang, Jing-Lin Wu
PRDC
2005
IEEE
15 years 6 months ago
Intersecting Sets: a Basic Abstraction for Asynchronous Agreement Problems
TING SETS: A BASIC ABSTRACTION FOR ASYNCHRONOUS AGREEMENT PROBLEMS ROY FRIEDMAN , ACHOUR MOSTEFAOUI , MICHEL RAYNAL
Roy Friedman, Achour Mostéfaoui, Michel Ray...
99
Voted
ICDCS
2002
IEEE
15 years 5 months ago
Key Trees and the Security of Interval Multicast
A key tree is a distributed data structure of security keys that can be used by a group of users. In this paper, we describe how any user in the group can use the different keys i...
Mohamed G. Gouda, Chin-Tser Huang, E. N. Elnozahy
121
Voted
NDSS
1999
IEEE
15 years 5 months ago
Addressing the Problem of Undetected Signature Key Compromise
Suppose that messages have been signed using a user's signature private key during the period of time after a key compromise but before the compromise is detected. This is a ...
Mike Just, Paul C. van Oorschot