Sciweavers

317 search results - page 11 / 64
» Certificateless Public Key Cryptography
Sort
View
GLOBECOM
2010
IEEE
13 years 7 months ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate
ISSEP
2010
Springer
217views Education» more  ISSEP 2010»
14 years 6 months ago
Teaching Public-Key Cryptography in School
Lucia Keller, Dennis Komm, Giovanni Serafini, Andr...
DATE
2005
IEEE
105views Hardware» more  DATE 2005»
14 years 3 months ago
A Novel Unified Architecture for Public-Key Cryptography
Alessandro Cilardo, Antonino Mazzeo, Nicola Mazzoc...
SAFECOMP
2005
Springer
14 years 3 months ago
Public-Key Cryptography and Availability
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security...
Tage Stabell-Kulø, Simone Lupetti
AC
1998
Springer
14 years 2 months ago
Emerging Standards for Public-Key Cryptography
Burton S. Kaliski Jr.