This is the first part of a two-part paper on information-theoretically secure secret key agreement. In this part, we study the secrecy problem under the widely studied source mod...
We have developed a self-healing key distribution scheme for secure multicast group communications for wireless sensor network environment. We present a strategy for securely distr...
Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ash...
The aim of this paper is to provide better support for the development of secure systems. We argue that current development practice suffers from two key problems:
Ivan Flechais, Martina Angela Sasse, Stephen Haile...
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a convenient tool to reduce the amount of trust in authorities in Identity-Bas...