Sciweavers

66 search results - page 3 / 14
» Secure Distributed Key Generation for Discrete-Log Based Cry...
Sort
View
IJNSEC
2010
152views more  IJNSEC 2010»
13 years 2 months ago
Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network
Wireless Mesh Network (WMN) is advocated as the major supporting technology for the next generation wireless Internet satisfying the needs of anywhere-anytime broadband Internet a...
Ramanarayana Kandikattu, Lillykutty Jacob
ICPR
2006
IEEE
14 years 8 months ago
Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme
We propose a novel biometrics cryptosystem where one can send and receive secure information using just the fingerprints. This cryptosystem is a judicious blend of the asymmetric ...
Abhishek Nagar, Santanu Chaudhury
IJNSEC
2010
98views more  IJNSEC 2010»
13 years 2 months ago
An MSS Based on the Elliptic Curve Cryptosystem
In 2004, a multi-signature scheme (MSS) based on the elliptic curve cryptosystem is given by Chen et al. [1]. Later, Liu and Liu [6] showed that if one of the users always sends h...
Hemlal Sahu, Birendra Kumar Sharma
FI
2011
96views more  FI 2011»
13 years 2 months ago
A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture
: In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mappin...
Oliver Hanka, Michael Eichhorn, Martin Pfannenstei...
CSFW
1999
IEEE
14 years 1 days ago
I/O Automaton Models and Proofs for Shared-Key Communication Systems
The combination of two security protocols, a simple shared-key communication protocol and the Di e-Hellman key distribution protocol, is modeled formally and proved correct. The m...
Nancy A. Lynch