Sciweavers

1251 search results - page 23 / 251
» On the security of group communication schemes
Sort
View
IJNSEC
2008
103views more  IJNSEC 2008»
15 years 1 months ago
General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security
A scheme for general group oriented ID-based cryptosystems is proposed. This scheme allows an authorized subset in the general access structure to cooperatively decrypt the cipher...
Chunxiang Xu, Junhui Zhou, Guozhen Xiao
95
Voted
JSS
2007
67views more  JSS 2007»
15 years 1 months ago
Worm-IT - A wormhole-based intrusion-tolerant group communication system
This paper presents Worm-IT, a new intrusion-tolerant group communication system with a membership service and a view-synchronous atomic multicast primitive. The system is intrusi...
Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lun...
66
Voted
JCSC
2000
58views more  JCSC 2000»
15 years 1 months ago
TDMA Secure Communication Scheme Based on Synchronization of Chua's Circuits
Zhenya He, Ke Li, Luxi Yang, Yuhui Shi
ASIACRYPT
2004
Springer
15 years 7 months ago
Constant-Round Authenticated Group Key Exchange for Dynamic Groups
Abstract. An authenticated group key exchange (AGKE) scheme allows a group of users in a public network to share a session key which may later be used to achieve desirable cryptogr...
Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee
128
Voted
SASN
2006
ACM
15 years 7 months ago
Location-aware key predistribution scheme for wide area wireless sensor networks
Key predistribution in wireless sensor networks refers to the problem of distributing secret keys among sensors prior to deployment. Solutions appeared in the literature can be cl...
Katerina Simonova, Alan C. H. Ling, Xiaoyang Sean ...