Sciweavers

981 search results - page 60 / 197
» Advanced Encryption Standard
Sort
View
MASS
2010
156views Communications» more  MASS 2010»
13 years 6 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
14 years 19 days ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
ICIC
2009
Springer
14 years 3 months ago
Group-Based Proxy Re-encryption Scheme
Recently, proxy re-encryption scheme received much attention. In this paper, we propose a proxy re-encryption used for divert ciphertext from one group to another. The scheme is bi...
Chunbo Ma, Jun Ao
EUROCRYPT
2010
Springer
14 years 1 months ago
Bonsai Trees, or How to Delegate a Lattice Basis
We introduce a new lattice-based cryptographic structure called a bonsai tree, and use it to resolve some important open problems in the area. Applications of bonsai trees include...
David Cash, Dennis Hofheinz, Eike Kiltz, Chris Pei...
WICON
2008
13 years 10 months ago
Using the EAP framework for fast media independent handover authentication
In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover: namely, re-authentication a...
Antonio Izquierdo, Nada Golmie, Katrin Hoeper, Lid...