Sciweavers

241 search results - page 12 / 49
» Quantum Authenticated Key Distribution
Sort
View
ISPA
2005
Springer
14 years 1 months ago
Storage-Optimal Key Sharing with Authentication in Sensor Networks
Abstract. Wireless Sensor Networks are edging closer to widespread feasibility with recent research showing promising results in developing and adapting new mechanisms to suit thei...
Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen
CANS
2008
Springer
103views Cryptology» more  CANS 2008»
13 years 9 months ago
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks
Abstract. Wireless sensors are low power devices which are highly constrained in terms of computational capabilities, memory, and communication bandwidth. While battery life is the...
David Galindo, Rodrigo Roman, Javier Lopez
EUROPKI
2006
Springer
13 years 11 months ago
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Abstract. Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper fo...
Maurizio Adriano Strangio
IJNSEC
2006
270views more  IJNSEC 2006»
13 years 7 months ago
Efficient Key Agreement for Large and Dynamic Multicast Groups
Secure multicast represents the core component of many web and multimedia applications such as pay-TV, teleconferencing, real-time distribution of stock market price and etc. The ...
Liming Wang, Chuan-Kun Wu
MDAI
2005
Springer
14 years 1 months ago
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing
Cryptography is the ancient science of encrypting messages so that only the sender and receiver can recover them. To achieve this goal, an agreed key between the sender and receive...
Takeshi Okamoto, Raylin Tso, Eiji Okamoto