Sciweavers

292 search results - page 4 / 59
» Public-Key Cryptography for RFID-Tags
Sort
View
NDSS
1997
IEEE
15 years 7 months ago
Distributed Authentication in Kerberos Using Public Key Cryptography
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authenticati...
Marvin A. Sirbu, John C.-I. Chuang
GLOBECOM
2010
IEEE
15 years 1 months ago
Secure Cooperation Incentive Scheme with Limited Use of Public Key Cryptography for Multi-Hop Wireless Network
Abstract-Secure cooperation incentive schemes usually use public key cryptography, which incur too heavy overhead to be used efficiently in limited-resource nodes. In this paper, w...
Mohamed Elsalih Mahmoud, Xuemin Shen
113
Voted
PERCOM
2007
ACM
16 years 3 months ago
Public-Key Cryptography for RFID-Tags
Lejla Batina, Jorge Guajardo, Tim Kerins, Nele Men...
136
Voted
ASIACRYPT
2003
Springer
15 years 7 months ago
Certificateless Public Key Cryptography
This paper introduces the concept of certificateless public key cryptography (CL-PKC). In contrast to traditional public key cryptographic systems, CL-PKC does not require the use...
Sattam S. Al-Riyami, Kenneth G. Paterson
148
Voted
ESAS
2004
Springer
15 years 9 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar