Sciweavers

1834 search results - page 39 / 367
» Public Key Cryptography
Sort
View
125
Voted
WS
2005
ACM
15 years 4 months ago
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs i...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
63
Voted
CRYPTO
1990
Springer
72views Cryptology» more  CRYPTO 1990»
15 years 3 months ago
On the Impossibility of Private Key Cryptography with Weakly Random Keys
James L. McInnes, Benny Pinkas
CSREASAM
2004
15 years 14 days ago
The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures
We model a private key's life cycle as a finite state machine. The states are the key's phases of life and the transition functions describe tasks to be done with the key...
Alexander Wiesmaier, Marcus Lippert, Vangelis Kara...
PAIRING
2009
Springer
142views Cryptology» more  PAIRING 2009»
15 years 5 months ago
Strongly Secure Certificateless Key Agreement
Georg Lippold, Colin Boyd, Juan Manuel Gonzá...
53
Voted
ACNS
2005
Springer
106views Cryptology» more  ACNS 2005»
15 years 4 months ago
N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords
Jin Wook Byun, Dong Hoon Lee