Sciweavers

1255 search results - page 53 / 251
» On Simple and Secure Key Distribution
Sort
View
130
Voted
TIT
2010
150views Education» more  TIT 2010»
14 years 10 months ago
Information-theoretic key agreement of multiple terminals: part I
This is the first part of a two-part paper on information-theoretically secure secret key agreement. In this part, we study the secrecy problem under the widely studied source mod...
Amin Aminzadeh Gohari, Venkat Anantharam
130
Voted
MSN
2007
Springer
192views Sensor Networks» more  MSN 2007»
15 years 9 months ago
Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks
We have developed a self-healing key distribution scheme for secure multicast group communications for wireless sensor network environment. We present a strategy for securely distr...
Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ash...
131
Voted
NSPW
2003
ACM
15 years 8 months ago
Bringing security home: a process for developing secure and usable systems
The aim of this paper is to provide better support for the development of secure systems. We argue that current development practice suffers from two key problems:
Ivan Flechais, Martina Angela Sasse, Stephen Haile...
149
Voted
SASN
2004
ACM
15 years 8 months ago
Location-aware key management scheme for wireless sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...
PKC
2009
Springer
131views Cryptology» more  PKC 2009»
16 years 4 months ago
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a convenient tool to reduce the amount of trust in authorities in Identity-Bas...
Benoît Libert, Damien Vergnaud