Sciweavers

1251 search results - page 86 / 251
» On the security of group communication schemes
Sort
View
AINA
2004
IEEE
13 years 12 months ago
Supervising Secret-Key Agreements in a Level-Based Hierarchy
A key agreement protocol is utilized in a network system such that two users are able to establish a commonly shared secret key. Entities within the same security level can commun...
Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang
PKC
2007
Springer
135views Cryptology» more  PKC 2007»
14 years 2 months ago
A Direct Anonymous Attestation Scheme for Embedded Devices
Abstract. Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its specifications for trusted computing platforms. Th...
He Ge, Stephen R. Tate
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
14 years 7 days ago
Practical Problems with a Cryptographic Protection Scheme
Z is a software system designed to provide media-transparent network services on a collection of UNIX® machines. These services are comprised of file transfer and command executi...
Jonathan M. Smith
GLOBECOM
2009
IEEE
14 years 1 days ago
Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks
Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, ...
Tian Lan, Ruby B. Lee, Mung Chiang
ICC
2007
IEEE
128views Communications» more  ICC 2007»
14 years 2 months ago
An Efficient Selective Receiver for STBC Scheme
—In this paper, we propose an efficient selective receiver for space-time block coding (STBC) scheme. In this proposed scheme, we divide the received signals into two groups. By ...
Lijun Liu, Sooyoung Kim, Myoung-Seob Lim