Sciweavers

1251 search results - page 51 / 251
» On the security of group communication schemes
Sort
View
PKC
2007
Springer
99views Cryptology» more  PKC 2007»
14 years 2 months ago
Full-Domain Subgroup Hiding and Constant-Size Group Signatures
We give a short constant-size group signature scheme, which we prove fully secure under reasonable assumptions in bilinear groups, in the standard model. We achieve this result by ...
Xavier Boyen, Brent Waters
ICC
2007
IEEE
269views Communications» more  ICC 2007»
14 years 2 months ago
A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks
–The many-to-one traffic pattern dominates in sensor networks, where a large number of sensor nodes send data to one sink. A sensor node may only communicate with a small portion...
Xiaojiang Du, Yang Xiao, Song Ci, Mohsen Guizani, ...
CCS
2008
ACM
13 years 10 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
ICC
2007
IEEE
111views Communications» more  ICC 2007»
14 years 2 months ago
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
Reiko Ann Miura-Ko, Nicholas Bambos
GLOBECOM
2007
IEEE
14 years 2 months ago
A Secure Data Transmission Scheme for Mobile Ad Hoc Networks
— We propose a secure data transmission scheme that takes advantage of node mobility. The scheme is based on the observation that due to mobility, messages sent at different time...
Qunwei Zheng, Xiaoyan Hong, Jun Liu, Lei Tang