Sciweavers

1058 search results - page 31 / 212
» Secure Group Communications Using Key Graphs
Sort
View
EUROCRYPT
2003
Springer
15 years 5 months ago
Cryptanalysis of the Public-Key Encryption Based on Braid Groups
At CRYPTO 2000, a new public-key encryption based on braid groups was introduced. This paper demonstrates how to solve its underlying problem using the Burau representation. By thi...
Eonkyung Lee, Je Hong Park
81
Voted
JSS
2007
67views more  JSS 2007»
15 years 12 days ago
Worm-IT - A wormhole-based intrusion-tolerant group communication system
This paper presents Worm-IT, a new intrusion-tolerant group communication system with a membership service and a view-synchronous atomic multicast primitive. The system is intrusi...
Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lun...
94
Voted
IJNSEC
2007
109views more  IJNSEC 2007»
15 years 13 days ago
SeReRoM: Secured Reliable Routing Scheme for Multicasting
This paper proposes a multipath routing scheme SeReRoM for a multicast group communication with a single source and multiple destinations. SeReRoM provides an environment that tac...
Rajavelu Srinivasan, V. Vaidehi, K. N. Srivathsan,...
124
Voted
SASN
2005
ACM
15 years 6 months ago
A key pre-distribution scheme for secure sensor networks using probability density function of node deployment
Pairwise key establishment is a fundamental service provided in secure sensor networks. However, due to resource constraints, establishing pairwise keys is not a trivial task. Rec...
Takashi Ito, Hidenori Ohta, Nori Matsuda, Takeshi ...
WISEC
2010
ACM
15 years 5 months ago
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks
In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with...
Qi Mi, John A. Stankovic, Radu Stoleru