Sciweavers

674 search results - page 5 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
ASIACRYPT
2008
Springer
13 years 9 months ago
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
Recently Cash, Kiltz, and Shoup [20] showed a variant of the Cramer-Shoup (CS) public key encryption (PKE) scheme [21] whose chosen-ciphertext (CCA) security relies on the computa...
Goichiro Hanaoka, Kaoru Kurosawa
PERCOM
2006
ACM
14 years 7 months ago
Multi-channel Protocols for Group Key Agreement in Arbitrary Topologies
We consider group key agreement (GKA) protocols, used by a group of peers to establish a shared secret key for multicast communications. There has been much previous work to impro...
Ford-Long Wong, Frank Stajano
ICAC
2005
IEEE
14 years 1 months ago
Distributed Stream Management using Utility-Driven Self-Adaptive Middleware
We consider pervasive computing applications that process and aggregate data-streams emanating from highly distributed data sources to produce a stream of updates that have an imp...
Vibhore Kumar, Brian F. Cooper, Karsten Schwan
IJNSEC
2010
120views more  IJNSEC 2010»
13 years 2 months ago
Secure Group Key Management Scheme for Multicast Networks
This paper proposes a scheme to provide security to dynamic multicast VoIP systems efficiently. Security is usually provided by encrypting the media packets sent from a user to ot...
R. Srinivasan, V. Vaidehi, R. Rajaraman, S. Kanaga...
EUC
2008
Springer
13 years 9 months ago
A Probabilistic Approach to Consistency Checking for Pervasive Context
Context-awareness is a key issue in pervasive computing. Context-aware applications are prone to the context consistency problem, where applications are confronted with conflictin...
Yu Huang 0002, Xiang Ma, XianPing Tao, Jiannong Ca...