Results 251 to 260 of about 3,013,541 (287)
Some of the next articles are maybe not open access.

Authenticated Tree Based Group Key Agreement

2009 International Conference on Computational Intelligence and Security, 2009
Secure and reliable group communication is an active area of research. Its popularity is caused by the growing importance of group-oriented and collaborative applications. The central research challenge is secure and efficient group key management.
Weijia Jiang, Jiguo Li
openaire   +1 more source

Idetity based group key agreement from bilinear pairing

Wuhan University Journal of Natural Sciences, 2006
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Wang, Liming, Wu, Chuankun
openaire   +1 more source

Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups

IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference, 2007
A group key agreement protocol is a process to establish a cryptographic key for a group of participants over an open network. In this paper, we propose a group key agreement (CAGKA) protocol, based on a certificateless public key cryptosystem. CAGKA protocol provides group key establishment and group membership change (join and leave) services for ...
Sungchul Heo, Zeen Kim, Kwangjo Kim
openaire   +1 more source

Group key agreement for wireless mesh networks

2009 IEEE 34th Conference on Local Computer Networks, 2009
Wireless mesh networks consist of stationary nodes that communicate over wireless connections. Since WLAN security standards are only applicable in the standard scenario where the access points are connected by a cable-bound backbone, nearly all mesh networks broacast messages in the clear.
Andreas Noack, Jorg Schwenk
openaire   +1 more source

An Efficient Authenticated Group Key Agreement Protocol

2007 41st Annual IEEE International Carnahan Conference on Security Technology, 2007
Authenticated group key agreement is an important cryptographic mechanism underlying many collaborative and distributed applications. Some identity-based authenticated group key agreement schemes are proposed, however most of these protocols are vulnerable to insider attacks, while the other protocols are not efficient in communication. In this paper a
He Yong-Zhong, Han Zhen
openaire   +1 more source

Group Key Agreement with Local Connectivity

IEEE Transactions on Dependable and Secure Computing, 2016
In this paper, we study a group key agreement problem where a user is only aware of his neighbors while the connectivity graph is arbitrary. In our problem, there is no centralized initialization for users. A group key agreement with these features is very suitable for social networks.
openaire   +1 more source

Authenticated Group Key Agreement Protocol Without Pairing

2018
Since the inception of pairing-based constructions in cryptography, the authentication in group key agreement (GKA) protocol has been usually achieved by pairings. But due to high computation cost of pairing such constructions are inefficient for practical implementation, specially for low power devices.
Sharma, Gaurav   +4 more
openaire   +1 more source

Group key agreement from bilinear pairings

2013
The use of bilinear pairings as a building block for cryptographic protocols, most notably in the construction of identity-based cryptosystems, is a very popular area of cryptographic research. In this thesis, we provide a novel classification of pairing-based group key agreement (GKA) from current literature.
openaire   +2 more sources

Asymmetric Group Key Agreement Protocol Based on Blockchain and Attribute for Industrial Internet of Things

IEEE Transactions on Industrial Informatics, 2022
Juyan Li, Zhiqi Qiao, Jialiang Peng
exaly  

A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0

IEEE Transactions on Industrial Informatics, 2022
Zisang Xu, wei liang, Kuan-Ching Li
exaly  

Home - About - Disclaimer - Privacy