Sciweavers

317 search results - page 11 / 64
» Certificateless Public Key Cryptography
Sort
View
150
Voted
GLOBECOM
2010
IEEE
15 years 1 months ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate
101
Voted
ISSEP
2010
Springer
217views Education» more  ISSEP 2010»
16 years 15 days ago
Teaching Public-Key Cryptography in School
Lucia Keller, Dennis Komm, Giovanni Serafini, Andr...
DATE
2005
IEEE
105views Hardware» more  DATE 2005»
15 years 9 months ago
A Novel Unified Architecture for Public-Key Cryptography
Alessandro Cilardo, Antonino Mazzeo, Nicola Mazzoc...
107
Voted
SAFECOMP
2005
Springer
15 years 9 months ago
Public-Key Cryptography and Availability
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security...
Tage Stabell-Kulø, Simone Lupetti
95
Voted
AC
1998
Springer
15 years 8 months ago
Emerging Standards for Public-Key Cryptography
Burton S. Kaliski Jr.