Sciweavers

1834 search results - page 39 / 367
» Public Key Cryptography
Sort
View
WS
2005
ACM
14 years 1 months ago
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs i...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
CSREASAM
2004
13 years 9 months ago
The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures
We model a private key's life cycle as a finite state machine. The states are the key's phases of life and the transition functions describe tasks to be done with the key...
Alexander Wiesmaier, Marcus Lippert, Vangelis Kara...
PAIRING
2009
Springer
142views Cryptology» more  PAIRING 2009»
14 years 2 months ago
Strongly Secure Certificateless Key Agreement
Georg Lippold, Colin Boyd, Juan Manuel Gonzá...