Sciweavers

1161 search results - page 44 / 233
» Group Message Authentication
Sort
View
IJNSEC
2008
146views more  IJNSEC 2008»
13 years 7 months ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li
ICC
2007
IEEE
118views Communications» more  ICC 2007»
13 years 11 months ago
Efficient Group Management For Inter-PN Access Control
This paper presents an architecture for resource sharing in Personal Networks (PNs). Resources are not necessarily in the same authentication domain and the group that uses them is...
Ahmad Ahmad, Khaled Masmoudi, Hossam Afifi
CIS
2005
Springer
14 years 1 months ago
On Anonymity of Group Signatures
A secure group signature is required to be anonymous, that is, given two group signatures generated by two different members on the same message or two group signatures generated ...
Sujing Zhou, Dongdai Lin
APSCC
2007
IEEE
14 years 2 months ago
ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments
In order to secure communications for dynamic peer groups in mobile computing environments, key agreement protocols are required. In this paper, we propose a new key agreement pro...
Raylin Tso, Xun Yi, Eiji Okamoto
HICSS
2006
IEEE
119views Biometrics» more  HICSS 2006»
14 years 1 months ago
Increasing Relevance of Smoking Cessation Messages in an Online Software Agent Environment
An online software agent that helps smokers quit was designed and tested. We created a library of categorized smoking cessation messages using meta-data corresponding to the Stage...
Todd Shimoda, Linda Stapel