Sciweavers

5891 search results - page 20 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
EUROPAR
2005
Springer
15 years 3 months ago
On AAA Based on Brokers and Pre-encrypted Keys in MIPv6
For providing mobility services for users through the global Internet, Mobile IP (MIP) has been standardized by IETF. Since conventional MIP has been investigated without the suppo...
Hoseong Jeon, Min Young Chung, Hyunseung Choo
PDCAT
2005
Springer
15 years 3 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
CORR
2010
Springer
147views Education» more  CORR 2010»
14 years 8 months ago
Cluster based Key Management in Wireless Sensor Networks
—Wireless sensor networks consist of sensor nodes with limited computational and communication capabilities. In this paper, the whole network of sensor nodes is divided into clus...
Anvesh Aileni
91
Voted
ACISP
2001
Springer
15 years 1 months ago
Error Detection and Authentication in Quantum Key Distribution
Akihiro Yamamura, Hirokazu Ishizuka