Sciweavers

190 search results - page 19 / 38
» A Wireless Security Framework without Shared Secrets
Sort
View
IWSEC
2009
Springer
14 years 3 months ago
ID-Based Group Password-Authenticated Key Exchange
Abstract—Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication is a human-memorable password. In this pa...
Xun Yi, Raylin Tso, Eiji Okamoto
ICICS
2005
Springer
14 years 2 months ago
Secure Multicast Using Proxy Encryption
In a secure multicast communication environment, only valid members belong to the multicast group could decrypt the data. In many previous researches, there is one “group key” ...
Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang
WORDS
2005
IEEE
14 years 2 months ago
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments
In emerging e-commerce applications, time constrained information sharing between different systems is becoming a common phenomenon. A flexible and efficient mechanism is needed t...
Smithi Piromruen, James B. D. Joshi
INFOCOM
2010
IEEE
13 years 7 months ago
Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication
—Jamming resistance is crucial for applications where reliable wireless communication is required. Spread spectrum techniques such as Frequency Hopping Spread Spectrum (FHSS) and...
Yao Liu, Peng Ning, Huaiyu Dai, An Liu
LCN
2008
IEEE
14 years 3 months ago
Key management in wireless sensor networks with inter-network sensor roaming
Wireless Sensor Networks (WSNs) have received considerable attention in recent years and opened up new possibilities for various commercial and industrial applications. A WSN cons...
S. Choi, V. Sarangan, S. Trost