Sciweavers

7 search results - page 1 / 2
» ijisec 2010
Sort
View
IJISEC
2010
73views more  IJISEC 2010»
14 years 8 months ago
A new probabilistic rekeying method for secure multicast groups
Alwyn Roshan Pais, Shankar Joshi
IJISEC
2010
85views more  IJISEC 2010»
14 years 8 months ago
EXAM: a comprehensive environment for the analysis of access control policies
Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, ...
IJISEC
2010
121views more  IJISEC 2010»
14 years 8 months ago
Flowchart description of security primitives for controlled physical unclonable functions
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable and that behave like a random function when subjected to a challenge. Their use h...
Boris Skoric, Marc X. Makkes
IJISEC
2010
87views more  IJISEC 2010»
14 years 8 months ago
How to construct identity-based signatures without the key escrow problem
The inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by a...
Tsz Hon Yuen, Willy Susilo, Yi Mu
98
Voted
IJISEC
2010
150views more  IJISEC 2010»
14 years 7 months ago
Efficient online/offline identity-based signature for wireless sensor network
In this paper, we present an online/offline identity-based signature scheme for the wireless sensor network (WSN). We argue that due to significant reduction in costs of computati...
Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanji...