Sciweavers

674 search results - page 5 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
ASIACRYPT
2008
Springer
15 years 6 months ago
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
Recently Cash, Kiltz, and Shoup [20] showed a variant of the Cramer-Shoup (CS) public key encryption (PKE) scheme [21] whose chosen-ciphertext (CCA) security relies on the computa...
Goichiro Hanaoka, Kaoru Kurosawa
PERCOM
2006
ACM
16 years 3 months ago
Multi-channel Protocols for Group Key Agreement in Arbitrary Topologies
We consider group key agreement (GKA) protocols, used by a group of peers to establish a shared secret key for multicast communications. There has been much previous work to impro...
Ford-Long Wong, Frank Stajano
ICAC
2005
IEEE
15 years 10 months ago
Distributed Stream Management using Utility-Driven Self-Adaptive Middleware
We consider pervasive computing applications that process and aggregate data-streams emanating from highly distributed data sources to produce a stream of updates that have an imp...
Vibhore Kumar, Brian F. Cooper, Karsten Schwan
IJNSEC
2010
120views more  IJNSEC 2010»
14 years 11 months ago
Secure Group Key Management Scheme for Multicast Networks
This paper proposes a scheme to provide security to dynamic multicast VoIP systems efficiently. Security is usually provided by encrypting the media packets sent from a user to ot...
R. Srinivasan, V. Vaidehi, R. Rajaraman, S. Kanaga...
EUC
2008
Springer
15 years 6 months ago
A Probabilistic Approach to Consistency Checking for Pervasive Context
Context-awareness is a key issue in pervasive computing. Context-aware applications are prone to the context consistency problem, where applications are confronted with conflictin...
Yu Huang 0002, Xiang Ma, XianPing Tao, Jiannong Ca...