Sciweavers

5891 search results - page 57 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
134
Voted
INDOCRYPT
2004
Springer
15 years 9 months ago
Revisiting Fully Distributed Proxy Signature Schemes
In a proxy signature scheme, a potential signer delegates his capabilities to a proxy signer, who can sign documents on behalf of him. The recipient of the signature verifies both...
Javier Herranz, Germán Sáez
117
Voted
PDP
2002
IEEE
15 years 8 months ago
Assignment Schemes for Replicated Services in Jini
Vasil Georgiev, Vladimir Getov
136
Voted
PODC
2004
ACM
15 years 9 months ago
Asynchronous group key exchange with failures
Group key exchange protocols allow a group of servers communicating over an asynchronous network of point-to-point links to establish a common key, such that an adversary which fu...
Christian Cachin, Reto Strobl
127
Voted
CCS
2003
ACM
15 years 7 months ago
LEAP: efficient security mechanisms for large-scale distributed sensor networks
We describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the ...
Sencun Zhu, Sanjeev Setia, Sushil Jajodia