Sciweavers

1058 search results - page 57 / 212
» Secure Group Communications Using Key Graphs
Sort
View
96
Voted
ICC
2009
IEEE
14 years 10 months ago
Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks
Abstract--In this work, we address the performance problems that arise when unicast security protocols IPSEC and SSL are applied for securing the end-to-end communication in hybrid...
Ayan Roy Chowdhury, John S. Baras
96
Voted
IACR
2011
149views more  IACR 2011»
14 years 7 days ago
Public Key Encryption for the Forgetful
We investigate public key encryption that allows the originator of a ciphertext to retrieve a “forgotten” plaintext from the ciphertext. This type of public key encryption wit...
Puwen Wei, Yuliang Zheng, Xiaoyun Wang
98
Voted
DRM
2004
Springer
15 years 6 months ago
A DRM security architecture for home networks
This paper describes a security architecture allowing digital rights management in home networks consisting of consumer electronic devices. The idea is to allow devices to establi...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
94
Voted
CORR
2010
Springer
111views Education» more  CORR 2010»
15 years 21 days ago
Towards Public Key Infrastructure less authentication in Session Initiation Protocol
The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for...
Abdullah Al Hasib, Abdullah Azfar, Md. Sarwar Mors...
SAINT
2003
IEEE
15 years 5 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta