Sciweavers

317 search results - page 5 / 64
» Certificateless Public Key Cryptography
Sort
View
IH
2009
Springer
14 years 4 months ago
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
Abstract. A physically unclonable function (PUF) is a multiple-input, multipleoutput, large entropy physical system that is unreproducible due to its structural complexity. A publi...
Nathan Beckmann, Miodrag Potkonjak
CRYPTO
1993
Springer
110views Cryptology» more  CRYPTO 1993»
14 years 1 months ago
Secret-Key Agreement without Public-Key Cryptography
Frank Thomson Leighton, Silvio Micali
CIS
2006
Springer
14 years 1 months ago
A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networks
Xiaolong Li, Yaping Lin, Siqing Yang, Yeqing Yi, J...
GLOBECOM
2007
IEEE
14 years 4 months ago
Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups
A Group Key Agreement protocol is a process to establish a cryptographic key for a group of participants over an open network. In this paper, we propose a group key agreement(CAGKA...
Sungchul Heo, Zeen Kim, Kwangjo Kim