Sciweavers

1058 search results - page 18 / 212
» Secure Group Communications Using Key Graphs
Sort
View
IACR
2011
124views more  IACR 2011»
14 years 4 days ago
Efficient Multicast Key Distribution Using HOWF-based Access Control Structures
— Both broadcast encryption (BE) protocols and multicast key distribution (MKD) protocols try to solve the same problem of private group communication. For the first time, we dis...
Jing Liu, Qiong Huang, Bo Yang
ISI
2003
Springer
15 years 5 months ago
Locating Hidden Groups in Communication Networks Using Hidden Markov Models
Malik Magdon-Ismail, Mark K. Goldberg, William A. ...
125
Voted
SASN
2004
ACM
15 years 6 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
IPCCC
2005
IEEE
15 years 6 months ago
Key management in wireless ad hoc networks: collusion analysis and prevention
Due to the dynamic nature of WAHN communications and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure c...
Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Elto...
ICOIN
2007
Springer
15 years 6 months ago
A Secure Message Percolation Scheme for Wireless Sensor Network
Wireless Sensor Network (WSN) deployed in hostile environments suffers from severe security threats. In this paper, we propose a Secure Message Percolation (SMP) scheme for WSN. We...
Md. Abdul Hamid, Choong Seon Hong