Sciweavers

4438 search results - page 79 / 888
» On the Distribution of Keys by Hashing
Sort
View
CSFW
2005
IEEE
15 years 5 months ago
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols
Authentication and secrecy properties are proved by very different methods: the former by local reasoning, leading to matching knowledge of all principals about the order of their...
Iliano Cervesato, Catherine Meadows, Dusko Pavlovi...
JCO
2007
56views more  JCO 2007»
14 years 11 months ago
An unexpected meeting of four seemingly unrelated problems: graph testing, DNA complex screening, superimposed codes and secure
This paper discusses the relation among four problems: graph testing, DNA complex screening, superimposed codes and secure key distribution. We prove a surprising equivalence relat...
H. B. Chen, Ding-Zhu Du, Frank K. Hwang
NCA
2006
IEEE
15 years 5 months ago
SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks
Clustered sensor networks have been shown to increase system throughput, decrease system delay, and save energy. While those with rotating cluster heads, such as LEACH, have also ...
Leonardo B. Oliveira, Hao Chi Wong, Marshall W. Be...
FI
2011
96views more  FI 2011»
14 years 6 months ago
A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture
: In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mappin...
Oliver Hanka, Michael Eichhorn, Martin Pfannenstei...
JNW
2006
174views more  JNW 2006»
14 years 12 months ago
802.11i Encryption Key Distribution Using Quantum Cryptography
Quantum cryptography is a promising solution towards absolute security in long term cryptosystems. While the use of quantum cryptography in fiber optical networks gets significant ...
Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange G...