Sciweavers

688 search results - page 14 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
SCN
2008
Springer
104views Communications» more  SCN 2008»
14 years 11 months ago
Architecture and protocols of the future European quantum key distribution network
Mehrdad Dianati, Romain Alleaume, Maurice Gagnaire...
ICCSA
2007
Springer
15 years 5 months ago
An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secre...
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae L...
ISCI
2010
146views more  ISCI 2010»
14 years 9 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
CORR
2010
Springer
111views Education» more  CORR 2010»
14 years 11 months ago
Towards Public Key Infrastructure less authentication in Session Initiation Protocol
The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for...
Abdullah Al Hasib, Abdullah Azfar, Md. Sarwar Mors...
IJNSEC
2008
140views more  IJNSEC 2008»
14 years 11 months ago
A Secure Group Key Management Scheme for Wireless Cellular Systems
In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the ...
Hwa Young Um, Edward J. Delp