Sciweavers

322 search results - page 9 / 65
» Entity Authentication and Key Distribution
Sort
View
JCP
2007
103views more  JCP 2007»
13 years 8 months ago
Conformance Testing a Set of Criteria for Assessing Trust
—The ability to authenticate the identity of an entity in an open and insecure environment such as the Internet plays an important role in reducing potential threats and Public k...
Omar Batarfi, Lindsay Marshall
NETWORKING
2004
13 years 9 months ago
Efficient, Authenticated, and Fault-Tolerant Key Agreement for Dynamic Peer Groups
We present an efficient authenticated and fault-tolerant protocol (AFTD) for tree-based key agreement. Our approach is driven by the insight that when a Diffie-Hellman blinded key ...
Li Zhou, Chinya V. Ravishankar
ISPA
2005
Springer
14 years 1 months ago
Storage-Optimal Key Sharing with Authentication in Sensor Networks
Abstract. Wireless Sensor Networks are edging closer to widespread feasibility with recent research showing promising results in developing and adapting new mechanisms to suit thei...
Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen
CANS
2008
Springer
103views Cryptology» more  CANS 2008»
13 years 10 months ago
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks
Abstract. Wireless sensors are low power devices which are highly constrained in terms of computational capabilities, memory, and communication bandwidth. While battery life is the...
David Galindo, Rodrigo Roman, Javier Lopez
EUROPKI
2006
Springer
14 years 3 days ago
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Abstract. Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper fo...
Maurizio Adriano Strangio