Sciweavers

356 search results - page 15 / 72
» AUTHMAC_DH: A New Protocol for Authentication and Key Distri...
Sort
View
WISTP
2007
Springer
14 years 1 months ago
A New Resilient Key Management Protocol for Wireless Sensor Networks
Wireless Sensor Networks (WSN) security is an important issue which has been investigated by researchers for few years. The most fundamental security problem in WSN is key manageme...
Chakib Bekara, Maryline Laurent-Maknavicius
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 6 months ago
A new key establishment scheme for wireless sensor networks
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the se...
Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu
ISCC
2003
IEEE
101views Communications» more  ISCC 2003»
14 years 29 days ago
A New Self-Healing Key Distribution Scheme
A self-healing key distributionscheme enables a group of users to establish a group key over an unreliable channel. In such a protocol, a group manager, to distributea session key...
Carlo Blundo, Paolo D'Arco, Massimiliano Listo
MMMACNS
2001
Springer
14 years 4 days ago
Dynamic Group Key Management Protocol
If multicast communication appears as the most efficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as...
Ghassan Chaddoud, Isabelle Chrisment, André...
CONCUR
2005
Springer
14 years 1 months ago
Timed Spi-Calculus with Types for Secrecy and Authenticity
Abstract. We present a discretely timed spi-calculus. A primitive for key compromise allows us to model key compromise attacks, thus going beyond the standard Dolev–Yao attacker ...
Christian Haack, Alan Jeffrey