Sciweavers

149 search results - page 18 / 30
» On the Performance of Group Key Agreement Protocols
Sort
View
CORR
2006
Springer
114views Education» more  CORR 2006»
13 years 7 months ago
A New Cryptosystem Based On Hidden Order Groups
Let G1 be a cyclic multiplicative group of order n. It is known that the Diffie-Hellman problem is random self-reducible in G1 with respect to a fixed generator g if (n) is known....
Amitabh Saxena, Ben Soh
PERCOM
2009
ACM
14 years 2 months ago
Securing Body Sensor Networks: Sensor Association and Key Management
—Body Sensor Networks can be used to continuously monitor patients’ health. However, secure association of sensors with the patient and key management for providing integrity a...
Sye Loong Keoh, Emil C. Lupu, Morris Sloman
CN
2006
69views more  CN 2006»
13 years 7 months ago
A framework for realistic and systematic multicast performance evaluation
Previous multicast research often makes commonly accepted but unverified assumptions on network topologies and group member distribution in simulation studies. In this paper, we p...
Li Lao, Jun-Hong Cui, Mario Gerla
ICDCS
1998
IEEE
13 years 12 months ago
A Suite of Database Replication Protocols based on Group Communication Primitives
This paper proposes a family of replication protocols based on group communication in order to address some of the concerns expressed by database designers regarding existing repl...
Bettina Kemme, Gustavo Alonso
ACNS
2006
Springer
121views Cryptology» more  ACNS 2006»
14 years 1 months ago
Authentication for Paranoids: Multi-party Secret Handshakes
In a society increasingly concerned with the steady assault on electronic privacy, the need for privacy-preserving techniques is both natural and justified. This need extends to t...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik