Sciweavers

1161 search results - page 69 / 233
» Group Message Authentication
Sort
View
IJNSEC
2007
156views more  IJNSEC 2007»
15 years 2 months ago
Another Look at PMAC
We can view an existing Message Authentication Code (MAC) as a Carter-Wegman MAC in spite of the fact it may not have been designed as one. This will make the analysis easier than...
Dayin Wang, Dongdai Lin, Wenling Wu
98
Voted
ACNS
2005
Springer
134views Cryptology» more  ACNS 2005»
15 years 8 months ago
Dynamic k-Times Anonymous Authentication
k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has applicat...
Lan Nguyen, Reihaneh Safavi-Naini
SIGOPSE
1990
ACM
15 years 6 months ago
Fault tolerance using group communication
We propose group communication as an efficient mechanism to support fault tolerance. Our approach is based on an efficient reliable broadcast protocol that requires on average onl...
M. Frans Kaashoek, Andrew S. Tanenbaum
116
Voted
WISEC
2009
ACM
15 years 9 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
IJNSEC
2008
103views more  IJNSEC 2008»
15 years 2 months ago
General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security
A scheme for general group oriented ID-based cryptosystems is proposed. This scheme allows an authorized subset in the general access structure to cooperatively decrypt the cipher...
Chunxiang Xu, Junhui Zhou, Guozhen Xiao