Sciweavers

33 search results - page 5 / 7
» Threshold Password-Authenticated Key Exchange
Sort
View
ASIACRYPT
2005
Springer
14 years 1 months ago
A Simple Threshold Authenticated Key Exchange from Short Secrets
Michel Abdalla, Olivier Chevassut, Pierre-Alain Fo...
ACNS
2005
Springer
116views Cryptology» more  ACNS 2005»
14 years 1 months ago
Two-Server Password-Only Authenticated Key Exchange
Typical protocols for password-based authentication assume a single server which stores all the information (e.g., the password) necessary to authenticate a user. Unfortunately, a...
Jonathan Katz, Philip D. MacKenzie, Gelareh Taban,...
GI
2004
Springer
14 years 26 days ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner
CNSR
2009
IEEE
164views Communications» more  CNSR 2009»
13 years 11 months ago
DibA: An Adaptive Broadcasting Scheme in Mobile Ad Hoc Networks
Broadcasting is a vital communication mechanism in Mobile Ad Hoc Networks, as it is the key element for exchanging control packets to support some services such as management and ...
Dimitrios Liarokapis, Alireza Shahrabi, Andreas Ko...
EDBT
2004
ACM
187views Database» more  EDBT 2004»
14 years 7 months ago
Hierarchical In-Network Data Aggregation with Quality Guarantees
Earlier work has demonstrated the effectiveness of in-network data aggregation in order to minimize the amount of messages exchanged during continuous queries in large sensor netwo...
Antonios Deligiannakis, Yannis Kotidis, Nick Rouss...