Sciweavers

731 search results - page 105 / 147
» New Security Results on Encrypted Key Exchange
Sort
View
IJBC
2008
50views more  IJBC 2008»
13 years 7 months ago
Secure Data Transmission Based on Multi-Input Multi-Output Delayed Chaotic System
This paper deals with the problem of secure data transmission based on multi-input multi-output delayed chaotic systems. A new multi-input secure data transmission scheme is propo...
Gang Zheng, Driss Boutat, Thierry Floquet, Jean-Pi...
RIVF
2007
13 years 9 months ago
Stochastic routing in large grid-shaped quantum networks
— This paper investigates the problem of secret key transmissions for an arbitrary Alice-Bob pair in Quantum Key Distribution (QKD)-based networks. We develop a realistic QKDbase...
Cuong Le Quoc, Patrick Bellot, Akim Demaille
PEWASUN
2004
ACM
14 years 1 months ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
IJNSEC
2011
239views more  IJNSEC 2011»
13 years 2 months ago
Digital Signature Scheme with Message Recovery Using Knapsack-based ECC
Digital signature authentication scheme provides secure communication between two users. Digital signatures guarantee end-to-end message integrity and authentication information a...
R. Rajaram Ramasamy, M. Amutha Prabakar
CCS
2009
ACM
14 years 8 months ago
Authenticated wireless roaming via tunnels: making mobile guests feel at home
In wireless roaming a mobile device obtains a service from some foreign network while being registered for the similar service at its own home network. However, recent proposals tr...
Mark Manulis, Damien Leroy, François Koeune...