-
1
-
-
0004135561
-
Key management for large dynamic groups: One-way function trees and amortized initialization
-
March 15
-
Balenson D, McGrew D, Sherman A. Key management for large dynamic groups: one-way function trees and amortized initialization, IRTF SMUG Meeting, March 15, 1999.
-
(1999)
IRTF SMUG Meeting
-
-
Balenson, D.1
McGrew, D.2
Sherman, A.3
-
2
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Barreto PSLM, Kim HY, Lynn B, Scott M. Efficient algorithms for pairing-based cryptosystems. In: Advances in cryptologycrypto'02. Lecture notes in computer science, vol. 2442; 2002. p. 35468.
-
(2002)
Advances in cryptology-crypto'02. Lecture Notes in Computer Science
, vol.2442
, pp. 354-368
-
-
Pslm, B.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
5
-
-
25844439422
-
Secure positioning of wireless devices with application to sensor networks
-
Miami, Florida; March
-
Capkun S, Hubaux J-P. Secure positioning of wireless devices with application to sensor networks. In: Proceedings of IEEE INFOCOM. Miami, Florida; March 2005. p. 191728.
-
(2005)
Proceedings of IEEE INFOCOM
, pp. 1917-1928
-
-
Capkun, S.1
Hubaux, J.-P.2
-
6
-
-
20444502239
-
An ID-based broadcast encryption scheme for key distribution
-
X. Du, Y. Wang, J. Ge, and Y. Wang An ID-based broadcast encryption scheme for key distribution IEEE Transactions on Broadcasting 51 2 2005 264 266
-
(2005)
IEEE Transactions on Broadcasting
, vol.51
, Issue.2
, pp. 264-266
-
-
Du, X.1
Wang, Y.2
Ge, J.3
Wang, Y.4
-
8
-
-
38049016463
-
Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains
-
Lecture notes in computer science
-
Dutta R, Chang EC, Mukhopadhyay S. Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains. In: ACNS 2007, Lecture notes in computer science, vol. 4521; 2007. p. 385400.
-
(2007)
ACNS 2007
, vol.4521
, pp. 385-400
-
-
Dutta, R.1
Chang, E.C.2
Mukhopadhyay, S.3
-
9
-
-
2442478355
-
Lightweight key management for wireless sensor networks
-
April
-
Eltoweissy M, Younis M, Ghumman K. Lightweight key management for wireless sensor networks. In: IEEE international conference on performance, computating, and communications; April 2004. p. 8138.
-
(2004)
IEEE International Conference on Performance, Computating, and Communications
, pp. 813-818
-
-
Eltoweissy, M.1
Younis, M.2
Ghumman, K.3
-
10
-
-
3543105535
-
Combinatorial optimization for group key management
-
M. Eltoweissy, M. Heydari, L. Morales, and H. Sudborough Combinatorial optimization for group key management Journal of Network and System Management 12 1 2004 33 50
-
(2004)
Journal of Network and System Management
, vol.12
, Issue.1
, pp. 33-50
-
-
Eltoweissy, M.1
Heydari, M.2
Morales, L.3
Sudborough, H.4
-
13
-
-
84937435227
-
The LSD broadcast encryption scheme
-
Lecture notes in computer science
-
Halevy D, Shamir A. The LSD broadcast encryption scheme. In: Advances in cryptologycrypto' 02. Lecture notes in computer science, vol. 2442; 2002. p. 4760.
-
(2002)
Advances in Cryptology-crypto' 02
, vol.2442
, pp. 47-60
-
-
Halevy, D.1
Shamir, A.2
-
14
-
-
33847305360
-
Fingerprint images encryption via multi-scroll chaotic attractors
-
F. Han, J. Hu, X. Yu, and Y. Wang Fingerprint images encryption via multi-scroll chaotic attractors Applied Mathematics and Computation 185 2 2007 931 939
-
(2007)
Applied Mathematics and Computation
, vol.185
, Issue.2
, pp. 931-939
-
-
Han, F.1
Hu, J.2
Yu, X.3
Wang, Y.4
-
15
-
-
65949120002
-
Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks
-
S. Han, B. Tian, M. He, and E. Chang Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks IEEE Transactions on Wireless Communications 8 4 2009
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.4
-
-
Han, S.1
Tian, B.2
He, M.3
Chang, E.4
-
17
-
-
27644512043
-
An efficient key distribution scheme with self-healing property
-
D. Hong, and J.S. Kang An efficient key distribution scheme with self-healing property IEEE Communication Letters 9 8 2005
-
(2005)
IEEE Communication Letters
, vol.9
, Issue.8
-
-
Hong, D.1
Kang, J.S.2
-
18
-
-
77955333989
-
A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
-
J. Hu, H.H. Chen, and TW. Hou A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations Computer Standards & Interfaces 32 56 2010 274 280
-
(2010)
Computer Standards & Interfaces
, vol.32
, Issue.56
, pp. 274-280
-
-
Hu, J.1
Chen, H.H.2
Hou, T.W.3
-
19
-
-
67349221790
-
A pixel-based scrambling scheme for digital medical images protection
-
J. Hu, and F. Han A pixel-based scrambling scheme for digital medical images protection Journal of Network and Computer Applications 32 4 2009 788 794
-
(2009)
Journal of Network and Computer Applications
, vol.32
, Issue.4
, pp. 788-794
-
-
Hu, J.1
Han, F.2
-
20
-
-
33750008721
-
Self-healing group key distribution with time-limited node revocation for wireless sensor networks
-
Jiang Y, Lin C, Shi M, Shen X. Self-healing group key distribution with time-limited node revocation for wireless sensor networks. Ad hoc Networks 2007;5:1423.
-
(2007)
Ad Hoc Networks
, vol.5
, pp. 14-23
-
-
Jiang, Y.1
Lin, C.2
Shi, M.3
Shen, X.4
-
21
-
-
38449117258
-
Secure group communication with self-healing and rekeying in wireless sensor networks
-
Kausar F, Hussain S, Park JH, Masood A. Secure group communication with self-healing and rekeying in wireless sensor networks. In: Proceedings of the third international conference, MSN 2007; 2007. p. 73748.
-
(2007)
Proceedings of the Third International Conference, MSN 2007
, pp. 737-748
-
-
Kausar, F.1
Hussain, S.2
Park, J.H.3
Masood, A.4
-
22
-
-
84943248325
-
An improved key management scheme for large dynamic groups using one-way function trees
-
October
-
Ku W, Chen S. An improved key management scheme for large dynamic groups using one-way function trees. In: International conference on parallel processing workshops '03. October 2003. p. 3916.
-
(2003)
International Conference on Parallel Processing Workshops '03
, pp. 391-396
-
-
Ku, W.1
Chen, S.2
-
24
-
-
33751064353
-
A framework for distributed key management schemes in heterogeneous wireless sensor networks
-
USA; April
-
Lu K, Qian Y, Hu J. A framework for distributed key management schemes in heterogeneous wireless sensor networks. In: The 25th IEEE international conference on performance, computing, and communications, USA; April 2006. p. 5139.
-
(2006)
The 25th IEEE International Conference on Performance, Computing, and Communications
, pp. 513-519
-
-
Lu, K.1
Qian, Y.2
Hu, J.3
-
28
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Lecture notes in computer science
-
Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. In: Advances in cryptologycrypto '01. Lecture notes in computer science, vol. 2139; 2001. p. 4162.
-
(2001)
Advances in Cryptology-crypto '01
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
29
-
-
0038650586
-
Efficient trace and revoke schemes
-
Lecture notes in computer science
-
Naor M, Pinkas B. Efficient trace and revoke schemes. In: Financial cryptography' 2000. Lecture notes in computer science, vol. 1962; 2000. p. 121.
-
(2000)
Financial Cryptography' 2000
, vol.1962
, pp. 1-21
-
-
Naor, M.1
Pinkas, B.2
-
32
-
-
0001827537
-
Identity-based cryptosystems and signature scheme
-
A. Shamir Identity-based cryptosystems and signature scheme Proceedings of Crypto 84 1984 47 53
-
(1984)
Proceedings of Crypto
, vol.84
, pp. 47-53
-
-
Shamir, A.1
-
33
-
-
79952238646
-
Self-healing key distribution with revocation
-
Staddon J, Miner S, Franklin M, Balfanz D, Malkin M, Dean D. Self-healing key distribution with revocation. In: Proceedings of IEEE symposium on security and privacy; 2002. p. 22440.
-
(2002)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 224-240
-
-
Staddon, J.1
Miner, S.2
Franklin, M.3
Balfanz, D.4
Malkin, M.5
Dean, D.6
-
34
-
-
78649325327
-
A chaos based encryption technique to protect ECG packets for time critical telecardiology applications
-
doi:10.1002/sec.226
-
Sufi F, Han F, Khail I, Hu J. A chaos based encryption technique to protect ECG packets for time critical telecardiology applications. Journal of Security and Communication Networks (2010), doi:10.1002/sec.226.
-
(2010)
Journal of Security and Communication Networks
-
-
Sufi, F.1
Han, F.2
Khail, I.3
Hu, J.4
-
36
-
-
78649321231
-
A Fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment
-
doi:10.1002/sec.225
-
Xi K, Ahmad T, Han F, Hu J. A Fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment. Journal of Security and Communication Networks (2010), doi:10.1002/sec.225.
-
(2010)
Journal of Security and Communication Networks
-
-
Xi, K.1
Ahmad, T.2
Han, F.3
Hu, J.4
-
38
-
-
33144476837
-
Location-based compromise-tolerant security mechanisms for wireless sensor networks
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang Location-based compromise-tolerant security mechanisms for wireless sensor networks IEEE Journal on Selected Areas in Communications 24 2 2006 247 260
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
|