Sciweavers

1251 search results - page 52 / 251
» On the security of group communication schemes
Sort
View
PIMRC
2008
IEEE
14 years 2 months ago
A key loss recovery scheme for secure broadcasts in wireless sensor networks
Abstract—Authenticity and secrecy of broadcast message content is important in wireless sensor networks deployed for battlefield control, emergency response, and natural resourc...
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...
JCM
2008
134views more  JCM 2008»
13 years 8 months ago
Cover-Free Family based Efficient Group Key Management Strategy in Wireless Sensor Network
Abstract-- Secure group key distribution and efficient rekeying is one of the most challenging security issues in sensor networks at present. In this paper, Latin square is firstly...
Li Xu, Jianwei Chen, Xiaoding Wang
STOC
1996
ACM
185views Algorithms» more  STOC 1996»
14 years 6 days ago
Adaptively Secure Multi-Party Computation
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries i.e., adversaries that may choose the corrupted parties during the course ...
Ran Canetti, Uriel Feige, Oded Goldreich, Moni Nao...
CCS
2005
ACM
14 years 1 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
IPPS
2007
IEEE
14 years 2 months ago
Improving Secure Communication Policy Agreements by Building Coalitions
In collaborative applications, participants agree on certain level of secure communication based on communication policy specifications. Given secure communication policy speci...
Srilaxmi Malladi, Sushil K. Prasad, Shamkant B. Na...