Sciweavers

731 search results - page 71 / 147
» New Security Results on Encrypted Key Exchange
Sort
View
CCS
2006
ACM
15 years 1 months ago
An efficient key establishment scheme for secure aggregating sensor networks
Key establishment is a fundamental prerequisite for secure communication in wireless sensor networks. A new node joining the network needs to efficiently and autonomously set up s...
Erik-Oliver Blaß, Martina Zitterbart
CORR
1999
Springer
138views Education» more  CORR 1999»
14 years 9 months ago
A simple proof of the unconditional security of quantum key distribution
Quantum key distribution is the best known application of quantum cryptography. Previously proposed proofs of security of quantum key distribution contain various technical subtle...
Hoi-Kwong Lo
CSREASAM
2003
14 years 11 months ago
Defending Against Denial of Service Attacks Using Secure Name Resolution
This paper proposes a technique to foil DoS (Denial of Service) attacks. The proposed technique converts a static service to a relocating service and provides information of the n...
Prashant Dewan, Partha Dasgupta, Vijay Karamcheti
AFRICACRYPT
2009
Springer
15 years 4 months ago
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
We propose a generic modelling technique that can be used to extend existing frameworks for theoretical security analysis in order to capture the use of timestamps. We apply this t...
Manuel Barbosa, Pooya Farshim
IACR
2011
124views more  IACR 2011»
13 years 9 months ago
Efficient Multicast Key Distribution Using HOWF-based Access Control Structures
— Both broadcast encryption (BE) protocols and multicast key distribution (MKD) protocols try to solve the same problem of private group communication. For the first time, we dis...
Jing Liu, Qiong Huang, Bo Yang