Sciweavers

1834 search results - page 2 / 367
» Public Key Cryptography
Sort
View
CRYPTO
1993
Springer
110views Cryptology» more  CRYPTO 1993»
13 years 11 months ago
Secret-Key Agreement without Public-Key Cryptography
Frank Thomson Leighton, Silvio Micali
ASIACRYPT
2010
Springer
13 years 4 months ago
Efficient Public-Key Cryptography in the Presence of Key Leakage
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana L&o...
CIS
2006
Springer
13 years 10 months ago
A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networks
Xiaolong Li, Yaping Lin, Siqing Yang, Yeqing Yi, J...
NDSS
1997
IEEE
13 years 11 months ago
Distributed Authentication in Kerberos Using Public Key Cryptography
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authenticati...
Marvin A. Sirbu, John C.-I. Chuang
PERCOM
2005
ACM
14 years 6 months ago
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
Security in wireless sensor networks is currently provided exclusively through symmetric key cryptography. In this paper we show that special purpose ultra-low power hardware impl...
Berk Sunar, Erdinç Öztürk, Gunnar...