Sciweavers

859 search results - page 113 / 172
» Key Establishment for General Ad Hoc Network
Sort
View
JSAC
2011
142views more  JSAC 2011»
14 years 6 months ago
A Distributed Key Management Framework with Cooperative Message Authentication in VANETs
Abstract—In this paper, we propose a distributed key management framework based on group signature to provision privacy in vehicular ad hoc networks (VANETs). Distributed key man...
Yong Hao, Yu Cheng, Chi Zhou, Wei Song
IDC
2009
Springer
14 years 9 months ago
Efficient Broadcasting by Selective Forwarding
A major challenge faced in mobile ad hoc networks (MANETs) is locating devices for communication, especially in the case of high node mobility and sparse node density. Present solu...
Doina Bein, Ajoy Kumar Datta, Balaji Ashok Sathyan...
CRYPTO
2010
Springer
228views Cryptology» more  CRYPTO 2010»
15 years 29 days ago
On Generalized Feistel Networks
We prove beyond-birthday-bound security for most of the well-known types of generalized Feistel networks: (1) unbalanced Feistel networks, where the n-bit to m-bit round functions ...
Viet Tung Hoang, Phillip Rogaway
AICT
2006
IEEE
102views Communications» more  AICT 2006»
15 years 1 months ago
Publishing, Retrieving and Streaming Lectures via Application Level Multicast
Structured peer-to-peer overlay network is an efficient solution for querying and retrieving resources spread between the peers. Unfortunately, key based routing of Distributed Ha...
Marco Milanesio, Giancarlo Ruffo
WS
2006
ACM
15 years 5 months ago
Integrity regions: authentication through presence in wireless networks
We introduce Integrity (I) regions, a novel security primitive that enables message authentication in wireless networks without the use of pre-established or pre-certified keys. ...
Srdjan Capkun, Mario Cagalj