Sciweavers

1834 search results - page 52 / 367
» Public Key Cryptography
Sort
View
CORR
2007
Springer
114views Education» more  CORR 2007»
13 years 9 months ago
SECOQC White Paper on Quantum Key Distribution and Cryptography
Romain Alleaume, Jan Bouda, Cyril Branciard, Thier...
ESORICS
2006
Springer
14 years 19 days ago
Reducing the Dependence of SPKI/SDSI on PKI
Abstract. Trust-management systems address the authorization problem in distributed systems. They offer several advantages over other approaches, such as support for delegation and...
Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwo...
IJSN
2006
76views more  IJSN 2006»
13 years 9 months ago
Elliptic curve cryptography-based access control in sensor networks
: Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right ...
Haodong Wang, Bo Sheng, Qun Li
IJNSEC
2010
152views more  IJNSEC 2010»
13 years 3 months ago
Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network
Wireless Mesh Network (WMN) is advocated as the major supporting technology for the next generation wireless Internet satisfying the needs of anywhere-anytime broadband Internet a...
Ramanarayana Kandikattu, Lillykutty Jacob