Sciweavers

1058 search results - page 40 / 212
» Secure Group Communications Using Key Graphs
Sort
View
ICC
2007
IEEE
118views Communications» more  ICC 2007»
15 years 4 months ago
Efficient Group Management For Inter-PN Access Control
This paper presents an architecture for resource sharing in Personal Networks (PNs). Resources are not necessarily in the same authentication domain and the group that uses them is...
Ahmad Ahmad, Khaled Masmoudi, Hossam Afifi
CSREASAM
2006
15 years 1 months ago
A New Approach For Source Authentication Of Multicast Data
Multicast Security is one of the important problems to solve for the successful deployment of group communication applications, and source authentication of multicast data is a key...
Jinxin He, Gaochao Xu, Zhiguo Zhou, Guannan Gong
94
Voted
CCS
2005
ACM
15 years 6 months ago
A modular correctness proof of IEEE 802.11i and TLS
The IEEE 802.11i wireless networking protocol provides mutual authentication between a network access point and user devices prior to user connectivity. The protocol consists of s...
Changhua He, Mukund Sundararajan, Anupam Datta, An...
117
Voted
VTC
2010
IEEE
167views Communications» more  VTC 2010»
14 years 11 months ago
An Efficient Authentication Scheme for Security and Privacy Preservation in V2I Communications
—In this paper, we propose a mutual authentication and key agreement scheme for V2I communications. Our scheme improves security and privacy protection compared with the existing...
Jung-Yoon Kim, Hyoung-Kee Choi, John A. Copeland
ACISP
2005
Springer
15 years 6 months ago
Group Signature Schemes with Membership Revocation for Large Groups
Group signature schemes with membership revocation have been intensively researched. However, signing and/or verification of some existing schemes have computational costs of O(R)...
Toru Nakanishi, Fumiaki Kubooka, Naoto Hamada, Nob...