Sciweavers

351 search results - page 41 / 71
» Public-Key Cryptography and Availability
Sort
View
CNSR
2008
IEEE
214views Communications» more  CNSR 2008»
14 years 2 months ago
HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee
AINA
2007
IEEE
14 years 1 months ago
Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients
We propose a four-party password authenticated interdomain key exchange protocol which makes use of properties of identity-based cryptography and secret public keys. Being passwor...
Ford-Long Wong, Hoon Wei Lim
CHES
2007
Springer
110views Cryptology» more  CHES 2007»
14 years 1 months ago
RFID Noisy Reader How to Prevent from Eavesdropping on the Communication?
RFID applications do not always use encryption to ensure the security as public key cryptographic algorithms that are costly in term of computing resources. We proposed to secure t...
O. Savry, F. Pebay-Peyroula, F. Dehmas, G. Robert,...
STORAGESS
2005
ACM
14 years 1 months ago
Toward securing untrusted storage without public-key operations
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, wid...
Dalit Naor, Amir Shenhav, Avishai Wool
PKC
2005
Springer
67views Cryptology» more  PKC 2005»
14 years 1 months ago
Symmetric Subgroup Membership Problems
Abstract. We define and discuss symmetric subgroup membership problems and their properties, including a relation to the Decision DiffieHellman problem. We modify the Cramer-Shoup...
Kristian Gjøsteen