Results 251 to 260 of about 3,013,541 (287)
Some of the next articles are maybe not open access.
Authenticated Tree Based Group Key Agreement
2009 International Conference on Computational Intelligence and Security, 2009Secure and reliable group communication is an active area of research. Its popularity is caused by the growing importance of group-oriented and collaborative applications. The central research challenge is secure and efficient group key management.
Weijia Jiang, Jiguo Li
openaire +1 more source
Idetity based group key agreement from bilinear pairing
Wuhan University Journal of Natural Sciences, 2006zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Wang, Liming, Wu, Chuankun
openaire +1 more source
Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups
IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference, 2007A group key agreement protocol is a process to establish a cryptographic key for a group of participants over an open network. In this paper, we propose a group key agreement (CAGKA) protocol, based on a certificateless public key cryptosystem. CAGKA protocol provides group key establishment and group membership change (join and leave) services for ...
Sungchul Heo, Zeen Kim, Kwangjo Kim
openaire +1 more source
Group key agreement for wireless mesh networks
2009 IEEE 34th Conference on Local Computer Networks, 2009Wireless mesh networks consist of stationary nodes that communicate over wireless connections. Since WLAN security standards are only applicable in the standard scenario where the access points are connected by a cable-bound backbone, nearly all mesh networks broacast messages in the clear.
Andreas Noack, Jorg Schwenk
openaire +1 more source
An Efficient Authenticated Group Key Agreement Protocol
2007 41st Annual IEEE International Carnahan Conference on Security Technology, 2007Authenticated group key agreement is an important cryptographic mechanism underlying many collaborative and distributed applications. Some identity-based authenticated group key agreement schemes are proposed, however most of these protocols are vulnerable to insider attacks, while the other protocols are not efficient in communication. In this paper a
He Yong-Zhong, Han Zhen
openaire +1 more source
Group Key Agreement with Local Connectivity
IEEE Transactions on Dependable and Secure Computing, 2016In this paper, we study a group key agreement problem where a user is only aware of his neighbors while the connectivity graph is arbitrary. In our problem, there is no centralized initialization for users. A group key agreement with these features is very suitable for social networks.
openaire +1 more source
Authenticated Group Key Agreement Protocol Without Pairing
2018Since the inception of pairing-based constructions in cryptography, the authentication in group key agreement (GKA) protocol has been usually achieved by pairings. But due to high computation cost of pairing such constructions are inefficient for practical implementation, specially for low power devices.
Sharma, Gaurav +4 more
openaire +1 more source
Group key agreement from bilinear pairings
2013The use of bilinear pairings as a building block for cryptographic protocols, most notably in the construction of identity-based cryptosystems, is a very popular area of cryptographic research. In this thesis, we provide a novel classification of pairing-based group key agreement (GKA) from current literature.
openaire +2 more sources

