Results 301 to 310 of about 6,885,434 (317)
Broadcast streams require authentication and confidentiality. Previous chapters present protocols for efficient authentication and signature protocols for broadcast streams. This chapter discusses confidentiality and access control.
Adrian Perrig, J. D. Tygar
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Enhancing 802.11i key distribution using quantum key distribution
International Journal of Applied Research on Information Technology and Computing, 2011Security of data is one of the most important factors to take into account while elaborating any information system, especially when the information is transmitted over a wireless network like one of a company, a factory, a campus, or more importantly a battlefield.
Mohamed Benmohammed, Rima Djellab
openaire +2 more sources
On the Distribution of a Key Distribution Center
2001A Key Distribution Center of a network is a server who generates and distributes secret keys used by groups of users to securely communicate. A Distributed Key Distribution Center is a set of servers that jointly realizes a Key Distribution Center. In this paper we study Distributed Key Distribution Centers, pointing out the advantages of this approach
openaire +3 more sources
2009 Fifth International Conference on Signal Image Technology and Internet Based Systems, 2009
We first review and compare private key distributions in MANETs based on secret sharing schemes. Since there exist many kinds of networks with different objectives and constraints, we then determine the suitable private key distribution scheme according to the nature of the network.
Alexis Bonnecaze, Alban Gabillon
openaire +2 more sources
We first review and compare private key distributions in MANETs based on secret sharing schemes. Since there exist many kinds of networks with different objectives and constraints, we then determine the suitable private key distribution scheme according to the nature of the network.
Alexis Bonnecaze, Alban Gabillon
openaire +2 more sources
Communication in key distribution schemes
IEEE Transactions on Information Theory, 1996Summary: A \((g,b)\) key distribution scheme allows conferences of \(g\) users to generate secret keys, such that disjoint coalitions of \(b\) users cannot gain any information on the generated key (in the information-theoretic sense). In this work, we study the relationships between communication and space efficiency of key distribution schemes.
Benny Chor, Amos Beimel
openaire +1 more source
On the distribution of keys by hashing
12th International Conference of the Chilean Computer Science Society, 2002. Proceedings., 2003The distribution of keys by a hash function as used in hash search with chaining is studied by considering the distribution of keys a random function front keys to buckets would give. This model gives surprisingly simple expressions for the mean value of some statistics on hash functions.
openaire +1 more source
A conference key distribution system
IEEE Transactions on Information Theory, 1982Encryption is used in a communication system to safeguard information in the transmitted messages from anyone other than the intended receiver(s). To perform the encryption and decryption the transmitter and receiver(s) ought to have matching encryption and decryption keys.
I. Ingemarsson, D. Tang, C. Wong
openaire +1 more source
Quantum Key Distribution [PDF]
In this chapter a complete QKD protocol is presented, starting from the transmission via the quantum channel up to the communication over the public channel. The protocol described here is the BB84 protocol, named after Bennett and Brassard [5]. There are other protocols like the B92 protocol [3], the six-state protocol [8], the SARG protocol [19] and ...
openaire +1 more source
2007
Zero Knowledge (ZK) theory formed the basis for practical identification and signature cryptosysems (invented by Fiat and Shamir). It also was used to construct a key distribution scheme (invented by Bauspiess and Knobloch); however, it seems that the ZK concept is less appropriate for key distribution systems (KDS), where the main cost is the number ...
Yacov Yacobi, Zahava Shmuely
openaire +2 more sources
Zero Knowledge (ZK) theory formed the basis for practical identification and signature cryptosysems (invented by Fiat and Shamir). It also was used to construct a key distribution scheme (invented by Bauspiess and Knobloch); however, it seems that the ZK concept is less appropriate for key distribution systems (KDS), where the main cost is the number ...
Yacov Yacobi, Zahava Shmuely
openaire +2 more sources
2018
Conventional implementations of cryptography are only computationally secure. The security of quantum cryptography (QC), on the other hand, is based on the inherent uncertainty in quantum phenomena at the physical layer of a communication system.
Mayssaa El Rifai +2 more
openaire +2 more sources
Conventional implementations of cryptography are only computationally secure. The security of quantum cryptography (QC), on the other hand, is based on the inherent uncertainty in quantum phenomena at the physical layer of a communication system.
Mayssaa El Rifai +2 more
openaire +2 more sources

