Sciweavers

859 search results - page 7 / 172
» Security for Key Management Interfaces
Sort
View
FGCS
2007
90views more  FGCS 2007»
15 years 5 months ago
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
Grid computing is a newly developed technology for complex systems with large-scale resource sharing and multi-institutional collaboration. The prominent feature of grid computing...
Xukai Zou, Yuan-Shun Dai, Xiang Ran
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
15 years 11 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...
LCN
2006
IEEE
15 years 11 months ago
Efficient Algorithms for Secure Multicast key Management
Group Multicast is becoming a prevalent issue in Network applications such as teleconferencing, payper-view, and information services. In order to secure group communications by p...
Elham Khabiri, Saïd Bettayeb
COCOON
2009
Springer
15 years 11 months ago
Approximation Algorithms for Key Management in Secure Multicast
Agnes Hui Chan, Rajmohan Rajaraman, Zhifeng Sun, F...
FPL
2004
Springer
67views Hardware» more  FPL 2004»
15 years 10 months ago
A Key Management Architecture for Securing Off-Chip Data Transfers
Jonathan Graf, Peter M. Athanas