Sciweavers

5891 search results - page 57 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
149
Voted
INDOCRYPT
2004
Springer
15 years 10 months ago
Revisiting Fully Distributed Proxy Signature Schemes
In a proxy signature scheme, a potential signer delegates his capabilities to a proxy signer, who can sign documents on behalf of him. The recipient of the signature verifies both...
Javier Herranz, Germán Sáez
153
Voted
PODC
2004
ACM
15 years 10 months ago
Asynchronous group key exchange with failures
Group key exchange protocols allow a group of servers communicating over an asynchronous network of point-to-point links to establish a common key, such that an adversary which fu...
Christian Cachin, Reto Strobl
CCS
2003
ACM
15 years 9 months ago
LEAP: efficient security mechanisms for large-scale distributed sensor networks
We describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the ...
Sencun Zhu, Sanjeev Setia, Sushil Jajodia