Sciweavers

1058 search results - page 78 / 212
» Secure Group Communications Using Key Graphs
Sort
View
135
Voted
CORR
2011
Springer
216views Education» more  CORR 2011»
14 years 9 months ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot
CIC
2006
114views Communications» more  CIC 2006»
15 years 3 months ago
Tree Based Conference Key Establishment Cost Analysis and Minimization in Heterogeneous Networks
A shared secret, conference key, must be established among members to securely communicate among them. The Diffie-Hellman is often used for the conference key establishment. In a ...
Zhan Liu, Mi Lu
85
Voted
CORR
2008
Springer
103views Education» more  CORR 2008»
15 years 2 months ago
Secret Communication with Feedback
Secure communication with feedback is studied. An achievability scheme in which the backward channel is used to generate a shared secret key is proposed. The scenario of binary sy...
Deniz Gündüz, D. Richard Brown III, H. V...
117
Voted
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
15 years 5 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
131
Voted
JSS
2008
97views more  JSS 2008»
15 years 2 months ago
XML security - A comparative literature review
Since the turn of the millenium, Working Groups of the W3C have been concentrating on the development of XML based security standards, which are paraphrased as XML Security. XML S...
Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Mark...