Sciweavers

859 search results - page 7 / 172
» Security for Key Management Interfaces
Sort
View
FGCS
2007
90views more  FGCS 2007»
13 years 7 months ago
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
Grid computing is a newly developed technology for complex systems with large-scale resource sharing and multi-institutional collaboration. The prominent feature of grid computing...
Xukai Zou, Yuan-Shun Dai, Xiang Ran
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
14 years 1 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...
LCN
2006
IEEE
14 years 1 months ago
Efficient Algorithms for Secure Multicast key Management
Group Multicast is becoming a prevalent issue in Network applications such as teleconferencing, payper-view, and information services. In order to secure group communications by p...
Elham Khabiri, Saïd Bettayeb
COCOON
2009
Springer
14 years 2 months ago
Approximation Algorithms for Key Management in Secure Multicast
Agnes Hui Chan, Rajmohan Rajaraman, Zhifeng Sun, F...