Results 211 to 220 of about 1,013,153 (241)
Some of the next articles are maybe not open access.
Lightweight key agreement with key chaining
The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010), 2010Small ad-hoc wireless networks are becoming ubiquitous. Wireless protocols like ZigBee, ANT, and Bluetooth have been targeted towards small devices with limited capabilities. As the volume and sensitivity of data being communicated over these networks increases so does the need for security. The limited capabilities of these devices, however, means the
Paul Krier +4 more
openaire +1 more source
32nd IEEE Conference on Local Computer Networks (LCN 2007), 2007
Secure group communication has various applications. Requirements for an application differ in various parameters such as tolerance times for join and leave, arrival rate, departure rate, staying period and group life time. Existing group key agreement protocols do not harness knowledge of application requirements.
INGLE, RAJESH, SIVAKUMAR, G
openaire +2 more sources
Secure group communication has various applications. Requirements for an application differ in various parameters such as tolerance times for join and leave, arrival rate, departure rate, staying period and group life time. Existing group key agreement protocols do not harness knowledge of application requirements.
INGLE, RAJESH, SIVAKUMAR, G
openaire +2 more sources
Quantum Conference Key Agreement
2021Quantum conference key agreement (CKA) extends the notion of quantum key distribution (QKD) to the multipartite scenario. We introduce CKA in Sect. 4.1 and present the multipartite generalization of the BB84 protocol, including insight on its security proof and asymptotic key rate. In Sect.
openaire +1 more source
2006
Especially for key establishment protocols to be used in internet applications, the (privacy) concern of deniability arises: Can a protocol transcript be used—possibly by a participant—to prove the involvement of another party in the protocol? For two party key establishment protocols, a common technique for achieving deniability is the replacement of ...
Jens-Matthias Bohli, Rainer Steinwandt
openaire +1 more source
Especially for key establishment protocols to be used in internet applications, the (privacy) concern of deniability arises: Can a protocol transcript be used—possibly by a participant—to prove the involvement of another party in the protocol? For two party key establishment protocols, a common technique for achieving deniability is the replacement of ...
Jens-Matthias Bohli, Rainer Steinwandt
openaire +1 more source
Certificates, Key Transport and Key Agreement
2015We can now perform encryption and authentication using either public key techniques or symmetric key techniques. However, we have not addressed how parties actually obtain the public key of an entity, or obtain a shared symmetric key. When using hybrid ciphers in Section 16.3 we showed how a symmetric key could be transported to another party, and then
openaire +1 more source
Certificateless Key Agreement Protocol
2010 2nd International Conference on E-business and Information System Security, 2010Certificateless cryptography aims at combining the advantages of identity based and public key cryptography in order to avoid the key escrow problem inherent in the identity based cryptography and cumbersome certificate management in the traditional public key infrastructure.
openaire +1 more source
2004
Mit der Verbreitung offener Netze, insbesondere des Internets, fand auch die Gruppenkommunikation eine rasante Verbreitung. Eine Vielzahl heutiger Protokolle sind gruppen-orientiert: angefangen bei Multicast-Diensten in der Netzwerkschicht bis hin zu Videokonferenzsystemen auf der Anwendungsschicht. Alle diese Dienste haben Sicherheitsanforderungen wie
openaire +1 more source
Mit der Verbreitung offener Netze, insbesondere des Internets, fand auch die Gruppenkommunikation eine rasante Verbreitung. Eine Vielzahl heutiger Protokolle sind gruppen-orientiert: angefangen bei Multicast-Diensten in der Netzwerkschicht bis hin zu Videokonferenzsystemen auf der Anwendungsschicht. Alle diese Dienste haben Sicherheitsanforderungen wie
openaire +1 more source

