Sciweavers

5891 search results - page 23 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
132
Voted
EUROCRYPT
1999
Springer
15 years 9 months ago
Distributed Pseudo-random Functions and KDCs
Abstract. This work describes schemes for distributing between n servers the evaluation of a function f which is an approximation to a random function, such that only authorized su...
Moni Naor, Benny Pinkas, Omer Reingold
137
Voted
ICDCS
2002
IEEE
15 years 10 months ago
Key Trees and the Security of Interval Multicast
A key tree is a distributed data structure of security keys that can be used by a group of users. In this paper, we describe how any user in the group can use the different keys i...
Mohamed G. Gouda, Chin-Tser Huang, E. N. Elnozahy
151
Voted
ACISP
2001
Springer
15 years 9 months ago
On Classifying Conference Key Distribution Protocols
In this paper, we examine a classification of conference key distribution protocols proposed in [4] and show that no known protocol satisfies the security requirements in class 4...
Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Su...
ICC
2007
IEEE
130views Communications» more  ICC 2007»
15 years 11 months ago
A Novel Key Redistribution Scheme for Wireless Sensor Networks
— Key management has long been a challenging problem in wireless Distributed Sensor Networks (DSNs) due to their high security requirements and strict resource constraints. Recen...
Chun-Fai Law, Ka-Shun Hung, Yu-Kwong Kwok
COMCOM
2011
15 years 15 hour ago
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between ...
Leonardo B. Oliveira, Diego F. Aranha, Conrado Por...