Sciweavers

149 search results - page 21 / 30
» On the Performance of Group Key Agreement Protocols
Sort
View
CSREASAM
2006
13 years 9 months ago
A New Approach For Source Authentication Of Multicast Data
Multicast Security is one of the important problems to solve for the successful deployment of group communication applications, and source authentication of multicast data is a key...
Jinxin He, Gaochao Xu, Zhiguo Zhou, Guannan Gong
JCS
2006
116views more  JCS 2006»
13 years 7 months ago
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks
We present GKMPAN, an efficient and scalable group rekeying protocol for secure multicast in ad hoc networks. Our protocol exploits the property of ad hoc networks that each membe...
Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jaj...
CRYPTO
2007
Springer
133views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
On Secure Multi-party Computation in Black-Box Groups
Abstract. We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function fG(x1, . . . , xn) = x1 · x...
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxio...
IANDC
2007
126views more  IANDC 2007»
13 years 7 months ago
Alternating two-way AC-tree automata
We explore the notion of alternating two-way tree automata modulo the theory of finitely many associative-commutative (AC) symbols. This was prompted by questions arising in cryp...
Kumar Neeraj Verma, Jean Goubault-Larrecq
ADVIS
2000
Springer
14 years 14 hour ago
Throughput Stability of Reliable Multicast Protocols
Traditional reliable multicast protocols depend on assumptions about flow control and reliability mechanisms, and they suffer from a kind of interference between these mechanisms. ...
Öznur Özkasap, Kenneth P. Birman