Sciweavers

20175 search results - page 26 / 4035
» Is abstraction the key to computing
Sort
View
158
Voted
ESAS
2007
Springer
15 years 4 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
113
Voted
SAC
2009
ACM
15 years 5 months ago
Discovering XML keys and foreign keys in queries
The XML has undoubtedly become a standard for data representation and manipulation. But most of XML documents are still created without the respective description of their structu...
Martin Necaský, Irena Mlýnková...
121
Voted
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 7 months ago
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
We enrich the classical notion of group key exchange (GKE) protocols by a new property that allows each pair of users to derive an independent peer-to-peer (p2p) key on-demand and ...
Mark Manulis
107
Voted
APSCC
2007
IEEE
15 years 6 months ago
ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments
In order to secure communications for dynamic peer groups in mobile computing environments, key agreement protocols are required. In this paper, we propose a new key agreement pro...
Raylin Tso, Xun Yi, Eiji Okamoto
DEXAW
2005
IEEE
127views Database» more  DEXAW 2005»
15 years 6 months ago
A Key Establishment IP-Core for Ubiquitous Computing
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the invest...
Markus Volkmer, Sebastian Wallner