Sciweavers

1251 search results - page 14 / 251
» On the security of group communication schemes
Sort
View
P2P
2005
IEEE
106views Communications» more  P2P 2005»
15 years 5 months ago
Trusted Computing: Providing Security for Peer-to-Peer Networks
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
ISI
2003
Springer
15 years 4 months ago
Locating Hidden Groups in Communication Networks Using Hidden Markov Models
Malik Magdon-Ismail, Mark K. Goldberg, William A. ...
VTC
2010
IEEE
167views Communications» more  VTC 2010»
14 years 10 months ago
An Efficient Authentication Scheme for Security and Privacy Preservation in V2I Communications
—In this paper, we propose a mutual authentication and key agreement scheme for V2I communications. Our scheme improves security and privacy protection compared with the existing...
Jung-Yoon Kim, Hyoung-Kee Choi, John A. Copeland
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
15 years 12 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
ASIACRYPT
2004
Springer
15 years 3 months ago
Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings
Group signature schemes are cryptographic systems that provide revocable anonymity for signers. We propose a group signature scheme with constant-size public key and signature leng...
Lan Nguyen, Reihaneh Safavi-Naini