Sciweavers

252 search results - page 30 / 51
» Secure Group Key Management Scheme for Multicast Networks
Sort
View
COMCOM
2007
95views more  COMCOM 2007»
13 years 7 months ago
Key management for long-lived sensor networks in hostile environments
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. Thes...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
13 years 11 months ago
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme suggesting identity...
Muhammad J. Bohio, Ali Miri
ICNP
2000
IEEE
13 years 12 months ago
Dynamic Internet Overlay Deployment and Management Using the X-Bone
The X-Bone dynamically deploys and manages Internet overlays to reduce con®guration e€ort and increase network component sharing. The X-Bone discovers, con®gures, and monitors ...
Joseph D. Touch
ACNS
2007
Springer
94views Cryptology» more  ACNS 2007»
14 years 1 months ago
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme
The one-way function tree (OFT) scheme proposed by Balenson et. al is widely regarded as an efficient key management solution for multicast communication in large dynamic groups. ...
Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu
JCP
2006
94views more  JCP 2006»
13 years 7 months ago
Broadcast Encryption Using Probabilistic Key Distribution and Applications
A family of novel broadcast encryption schemes based on probabilistic key pre-distribution are proposed, that enable multiple sources to broadcast secrets, without the use of asymm...
Mahalingam Ramkumar