Sciweavers

447 search results - page 7 / 90
» Mobile Secret Key Distribution with Network Coding
Sort
View
IJNSEC
2008
140views more  IJNSEC 2008»
13 years 7 months ago
A Secure Group Key Management Scheme for Wireless Cellular Systems
In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the ...
Hwa Young Um, Edward J. Delp
PKC
2004
Springer
160views Cryptology» more  PKC 2004»
14 years 25 days ago
Constant Round Authenticated Group Key Agreement via Distributed Computation
Abstract. A group key agreement protocol allows a set of users, communicating over a public network, to agree on a private session key. Most of the schemes proposed so far require ...
Emmanuel Bresson, Dario Catalano
ADHOCNETS
2009
Springer
13 years 10 months ago
Efficient Distribution of Large Files in UMTS Supported by Network Coded M2M Data Transfer with Multiple Generations
This paper is a sequel of previous work, in which we have studied the traffic management problem in UMTS. The main objective was to improve the spectral efficiency of cellular netw...
Larissa Popova, Wolfgang H. Gerstacker, Wolfgang K...
CSREASAM
2007
13 years 9 months ago
Allocation of Partitioned Data by Using A Neural Network Based Approach
In this paper, we investigate allocation of data partitions in the network for data objects that are partitioned by using secret sharing schemes [12] or erasure coding schemes [11...
Manghui Tu, Dongfeng Wang, Peng Li, Nasser Tadayon
SASN
2004
ACM
14 years 27 days ago
Location-aware key management scheme for wireless sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...