Sciweavers

859 search results - page 34 / 172
» Security for Key Management Interfaces
Sort
View
FC
2007
Springer
141views Cryptology» more  FC 2007»
14 years 1 months ago
WSKE: Web Server Key Enabled Cookies
In this paper, we present the design and prototype of a new approach to cookie management: if a server deposits a cookie only after authenticating itself via the SSL handshake, the...
Chris Masone, Kwang-Hyun Baek, Sean W. Smith
ACSAC
2003
IEEE
14 years 26 days ago
Protecting Personal Data: Can IT Security Management Standards Help?
Compelled to improve information security by the introduction of personal data protection legislation, organizations worldwide are adopting standardized security management guidel...
Giovanni Iachello
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 5 months ago
A new key establishment scheme for wireless sensor networks
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the se...
Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu
IJNSEC
2007
145views more  IJNSEC 2007»
13 years 7 months ago
Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks
The lack of fixed infrastructure, both physical and organizational, and the highly dynamic nature of ad hoc networks, presents a major challenge in providing secure, authenticate...
Ahmed Abdel-Hafez, Ali Miri, Luis Orozco-Barbosa
ADHOCNOW
2006
Springer
14 years 1 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong