Results 71 to 80 of about 496,765 (185)
Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks
In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme.
Jun-Sub Kim, Jin Kwak
doaj +1 more source
Anonymous Quantum Conference Key Agreement
Conference key agreement (CKA) is a cryptographic effort of multiple parties to establish a shared secret key. In future quantum networks, generating secret keys in an anonymous way is of tremendous importance for parties that want to keep their shared ...
Frederik Hahn, Jarn de Jong, Anna Pappa
doaj +1 more source
Anonymous Aggregator Election and Data Aggregation in Wireless Sensor Networks
In mission critical cyber-physical systems, dependability is an important requirement at all layers of the system architecture. In this paper, we propose protocols that increase the dependability of wireless sensor networks, which are potentially useful ...
Tamás Holczer, Levente Buttyán
doaj +1 more source
Strongly Stable Networks [PDF]
We analyze the formation of networks among individuals. In particular, we examine the existence of networks that are stable against changes in links by any coalition of individuals.
Anne van den Nouweland +1 more
core
Anonymous authentication and location privacy preserving schemes for LTE-A networks
Long Term Evaluation Advanced (LTE-A) is the third generation partnership project for cellular network that allows subscribers to roam into networks (i.e., the Internet and wireless connections) using spacial purpose base-stations, such as wireless ...
Zaher Jabr Haddad +2 more
doaj +1 more source
Computation in anonymous networks
We identify and investigate a computational model arising in molecular computing, social computing and sensor network. The model is made of of multiple agents who are computationally limited and posses no global information. The agents may represent nodes in a social network, sensors, or molecules in a molecular computer. Assuming that each agent is in
Mossel, Elchanan +2 more
openaire +2 more sources
How to Meet in Anonymous Network
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kowalski, Dariusz R., Malinowski, Adam
openaire +2 more sources
Distributed Computing on Anonymous Hypercube Networks
Summary: We consider the bit-complexity (i.e.a, total number of bits transmitted) of computing Boolean functions on an anonymous canonically labeled \(n\)-dimensional hypercube network and give a characterization of the Boolean functions computable on such a network as exactly those Boolean functions which are invariant under all bit-complement ...
E. Kranakis, D. Krizanc
openaire +2 more sources
An anonymous entropy-based location privacy protection scheme in mobile social networks
The popularization of mobile communication devices and location technology has spurred the increasing demand for location-based services (LBSs). While enjoying the convenience provided by LBS, users may be confronted with the risk of privacy leakage.
Lina Ni +4 more
doaj +1 more source
Anonymous Cluster-Based MANETs with Threshold Signature
Security supports are a significant factor in the design of security system in ad hoc networks. It is particularly important to protect the identities of individual nodes to avoid personal privacy concerns. In this paper, we propose a security system for
YoHan Park, YoungHo Park, SangJae Moon
doaj +1 more source

