-
1
-
-
0034317075
-
Key agreement in ad hoc networks
-
DOI 10.1016/S0140-3664(00)00249-8
-
Asokan N. and Ginzboorg P., Key agreement in ad hoc networks, Computer Communications, 23(2000), 1627-1637. (Pubitemid 32033563)
-
(2000)
Computer Communications
, vol.23
, Issue.17
, pp. 1627-1637
-
-
Asokan, N.1
Ginzboorg, P.2
-
2
-
-
34547348650
-
Id-based ring signature and proxy ring signature schemes from bilinear pairings
-
Awasthi A. K. and Lal S., Id-based ring signature and proxy ring signature schemes from bilinear pairings, International Journal of Network Security, 4(2007), 187-192.
-
(2007)
International Journal of Network Security
, vol.4
, pp. 187-192
-
-
Awasthi, A.K.1
Lal, S.2
-
3
-
-
0027589399
-
Fully-fledged two-way public key authentication and key agreement for low-cost terminals
-
Beller M. J. and Yacobi Y., Fully-fledged two-way public key authentication and key agreement for low-cost terminals, IEE Electronics Letters, 29(1993), 999-1001.
-
(1993)
IEE Electronics Letters
, vol.29
, pp. 999-1001
-
-
Beller, M.J.1
Yacobi, Y.2
-
5
-
-
84874324906
-
Identity based encryption from the well pairing
-
LNCS 2139
-
Boneh D. and Franklin M., Identity based encryption from the well pairing, Advances in Cryptology-Crypto'2001, LNCS 2139, 2001, 213-229.
-
(2001)
Advances in Cryptology-Crypto'
, vol.2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
4544386246
-
Mutual authentication and group key agreement for low-power mobile devices
-
Bresson E., Chevassut O., Essiari A., and Pointcheval D., Mutual authentication and group key agreement for low-power mobile devices, Computer Communications, 27(2004), 1730-1737.
-
(2004)
Computer Communications
, vol.27
, pp. 1730-1737
-
-
Bresson, E.1
Chevassut, O.2
Essiari, A.3
Pointcheval, D.4
-
8
-
-
84948991087
-
A secure and efficient conference key distribution system
-
(Proc. Eurocrypt 1994)
-
Burmester M. and Desmedt Y., A secure and efficient conference key distribution system, Lecture Notes in Computer Science (Proc. Eurocrypt 1994), 950(1995), 275-286.
-
(1995)
Lecture Notes in Computer Science
, vol.950
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
9
-
-
79958802104
-
Analysis and improvement of a new authenticated group key agreement in a mobile environment
-
Cheng Q. F., Ma C. G., and Wei F. S., Analysis and improvement of a new authenticated group key agreement in a mobile environment, Annals Of Telecommunications-Annales Des Telecommunications, 66(2011), 331-337.
-
(2011)
Annals of Telecommunications-Annales des Telecommunications
, vol.66
, pp. 331-337
-
-
Cheng, Q.F.1
Ma, C.G.2
Wei, F.S.3
-
10
-
-
84255215492
-
Towards a practical and sealable trusted software dissemination system
-
Chuan D., Lin Y., Linru M., and Yuan C., Towards a practical and sealable trusted software dissemination system, Journal of Convergence, 2(2011), 53-60.
-
(2011)
Journal of Convergence
, vol.2
, pp. 53-60
-
-
Chuan, D.1
Lin, Y.2
Linru, M.3
Yuan, C.4
-
11
-
-
34848813206
-
All-in-one group-oriented cryptosystem based on bilinear pairing
-
DOI 10.1016/j.ins.2007.06.026, PII S002002550700326X
-
Chung J. T., Li C. M., and Hwang T., All-in-one group-oriented cryptosystem based on bilinear pairing, Information Sciences, 177(2007), 5651-5663. (Pubitemid 47495921)
-
(2007)
Information Sciences
, vol.177
, Issue.24
, pp. 5651-5663
-
-
Chung, J.-T.1
Li, C.-M.2
Hwang, T.3
-
12
-
-
43749092801
-
Provably secure constant round contributory group key agreement in dynamic setting
-
DOI 10.1109/TIT.2008.920224
-
Dutta R. and Barua R., Provably secure constant round contributory group key agreement in dynamic setting, IEEE Transaction on Infomormation Theory, 54(2008), 2007-2025. (Pubitemid 351689545)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.5
, pp. 2007-2025
-
-
Dutta, R.1
Barua, R.2
-
14
-
-
85015271520
-
Two-layer security scheme for AMI system
-
Hsu P. H., Tang W., Tsai C., Cheng B. C., Two-layer security scheme for AMI system, Journal of Convergence, 2(2011), 47-52.
-
(2011)
Journal of Convergence
, vol.2
, pp. 47-52
-
-
Hsu, P.H.1
Tang, W.2
Tsai, C.3
Cheng, B.C.4
-
15
-
-
0029256120
-
Conference key distribution protocols for digital mobile communication systems
-
Hwang M. S. and Yang W. P., Conference key distribution protocols for digital mobile communication systems, IEEE Journal on Selected Areas in Communications, 13(1995), 416-420.
-
(1995)
IEEE Journal on Selected Areas in Communications
, vol.13
, pp. 416-420
-
-
Hwang, M.S.1
Yang, W.P.2
-
16
-
-
0020180459
-
A conference key distribution system
-
Ingemaresson I., Tang T. D., and Wong C. K., A conference key distribution system, IEEE Transaction on Infomormation Theory, 28(1982), 714-720.
-
(1982)
IEEE Transaction on Infomormation Theory
, vol.28
, pp. 714-720
-
-
Ingemaresson, I.1
Tang, T.D.2
Wong, C.K.3
-
17
-
-
3142512728
-
Tree based group key agreement
-
Kim Y., Perrig A., and Tsudik G., Tree based group key agreement, ACM Trans. Inf. Syst. Security, 7(2004), 60-96.
-
(2004)
ACM Trans. Inf. Syst. Security
, vol.7
, pp. 60-96
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
18
-
-
72849129806
-
A new authenticated group key agreement in a mobile environment
-
Lee C. C., Lin T. H., and Tsai C. S., A new authenticated group key agreement in a mobile environment, Annals Of Telecommunications-Annales Des Telecommunications, 64(2009), 735-744.
-
(2009)
Annals of Telecommunications-Annales des Telecommunications
, vol.64
, pp. 735-744
-
-
Lee, C.C.1
Lin, T.H.2
Tsai, C.S.3
-
19
-
-
0034504654
-
Security enhancement for the simple authentication key agreement algorithm
-
Lin I. C., Chang C. C., and Hwang M. S., Security enhancement for the simple authentication key agreement algorithm, The Twenty-Fourth Annual International Computer Software and Applications Conference(COMPSAC)'2000, 2000, 113-115.
-
(2000)
The Twenty-Fourth Annual International Computer Software and Applications Conference(COMPSAC)'
, vol.2000
, pp. 113-115
-
-
Lin, I.C.1
Chang, C.C.2
Hwang, M.S.3
-
20
-
-
19744369256
-
DDH-based group key agreement in a mobile environment
-
DOI 10.1016/j.jss.2004.10.024, PII S0164121204002262
-
Nam J., Lee J., Kim S., and Won D., DDH-based group key agreement in a mobile environment, The Journal of Systems and Software, 78(2005), 73-83. (Pubitemid 40743528)
-
(2005)
Journal of Systems and Software
, vol.78
, Issue.1
, pp. 73-83
-
-
Nam, J.1
Lee, J.2
Kim, S.3
Won, D.4
-
21
-
-
33846643950
-
Self-certified signature scheme from pairings
-
DOI 10.1016/j.jss.2006.05.033, PII S016412120600166X
-
Shao Z., Self-certified signature scheme from pairings, The Journal of Systems and Software, 80(2007), 388-395. (Pubitemid 46187280)
-
(2007)
Journal of Systems and Software
, vol.80
, Issue.3 SPEC. ISS.
, pp. 388-395
-
-
Shao, Z.1
-
22
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
Shoup V., Lower bounds for discrete logarithms and related problems, Proceedings of advances in cryptology-Eurocrypt '97, 1997, 256-266.
-
(1997)
Proceedings of Advances in Cryptology-Eurocrypt '
, vol.97
, pp. 256-266
-
-
Shoup, V.1
-
23
-
-
80054068072
-
Secure group key management scheme for multicast networks
-
Srinivasan R., Vaidehi V., Rajaraman R., Kanagaraj S., Chidambaram Kalimuthu R., and Dharmaraj R., Secure group key management scheme for multicast networks, International Journal of Network Security, 11(2010), 33-38.
-
(2010)
International Journal of Network Security
, vol.11
, pp. 33-38
-
-
Srinivasan, R.1
Vaidehi, V.2
Rajaraman, R.3
Kanagaraj, S.4
Chidambaram Kalimuthu, R.5
Dharmaraj, R.6
-
24
-
-
0029720059
-
Diffie-Hellman key distribution extended to group communication
-
Steiner M., Tsudik G., and Waidner M., Diffie-Hellman key distribution extended to group communication, Proceedings of ACM CCS 1996,1996, 31-37.
-
(1996)
Proceedings of ACM CCS
, vol.1996
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
25
-
-
0347309397
-
Cryptanalysis and improvement of key distribution system for VS AT satellite communications
-
Tseng Y. M., Cryptanalysis and improvement of key distribution system for VS AT satellite communications, Informatica, 13(2002), 369-376.
-
(2002)
Informatica
, vol.13
, pp. 369-376
-
-
Tseng, Y.M.1
-
26
-
-
0344984336
-
A scalable key management scheme with minimizing key storage for secure group communications
-
Tseng Y. M., A scalable key management scheme with minimizing key storage for secure group communications, International Journal of Network Management, 13(2003), 419-425.
-
(2003)
International Journal of Network Management
, vol.13
, pp. 419-425
-
-
Tseng, Y.M.1
-
27
-
-
25844432081
-
A robust multi-party key agreement protocol resistant to malicious participants
-
Tseng Y. M., A robust multi-party key agreement protocol resistant to malicious participants, The Computer Journal, 48(2005), 480-487.
-
(2005)
The Computer Journal
, vol.48
, pp. 480-487
-
-
Tseng, Y.M.1
-
28
-
-
34249876364
-
A resource-constrained group key agreement protocol for imbalanced wireless networks
-
Tseng Y. M., A resource-constrained group key agreement protocol for imbalanced wireless networks, Computers & Security, 26(2007), 331-337.
-
(2007)
Computers & Security
, vol.26
, pp. 331-337
-
-
Tseng, Y.M.1
-
29
-
-
80052855282
-
A secure group key management scheme for wireless cellular systems
-
Um H. and Delp Edward J., A secure group key management scheme for wireless cellular systems, International Journal of Network Security, 6(2008), 40-52.
-
(2008)
International Journal of Network Security
, vol.6
, pp. 40-52
-
-
Um, H.1
Delp Edward, J.2
-
30
-
-
34248512208
-
Identity based proxy multi-signature
-
DOI 10.1016/j.jss.2006.12.565, PII S0164121207000039, Dynamic Resource Management in Distributed Real-Time Systems
-
Wang Q. and Cao Z., Identity based proxy multi-signature, The Journal of Systems and Soñware, 80(2007), 1023-1029. (Pubitemid 46754473)
-
(2007)
Journal of Systems and Software
, vol.80
, Issue.7
, pp. 1023-1029
-
-
Wang, Q.1
Cao, Z.2
-
31
-
-
84858132835
-
Hierarchical key derivation scheme for group-oriented communication systems
-
Wang S. J., Tsai Y. R., Sheh C. C., and Chen P. Y., Hierarchical key derivation scheme for group-oriented communication systems, International Journal of Information Technology, Communications and Convergence, 1(2011), 66-76.
-
International Journal of Information Technology, Communications and Convergence
, vol.1
, Issue.2011
, pp. 66-76
-
-
Wang, S.J.1
Tsai, Y.R.2
Sheh, C.C.3
Chen, P.Y.4
-
32
-
-
85015266833
-
On secure communication in integrated heterogeneous wireless networks
-
Xie B., Kumar A., Zhao D., Reddy R., and He B., On secure communication in integrated heterogeneous wireless networks, International Journal of Information Technology, Communications and Convergence, 1(2011), 4-23.
-
International Journal of Information Technology, Communications and Convergence
, vol.1
, Issue.2011
, pp. 4-23
-
-
Xie, B.1
Kumar, A.2
Zhao, D.3
Reddy, R.4
He, B.5
-
33
-
-
84874110332
-
Medium access control with dynamic frame length in wireless sensor networks
-
Yoo D. S. and Choi S. S., Medium access control with dynamic frame length in wireless sensor networks, Journal of Information Processing Systems, 6(2010), 501-510.
-
Journal of Information Processing Systems
, vol.6
, Issue.2010
, pp. 501-510
-
-
Yoo, D.S.1
Choi, S.S.2
-
34
-
-
84886885367
-
Probabilistic soft error detection based on anomaly speculation
-
Yoo J., Probabilistic soft error detection based on anomaly speculation, Journal of Information Processing Systems, 7(2011), 435-446.
-
Journal of Information Processing Systems
, vol.7
, Issue.2011
, pp. 435-446
-
-
Yoo, J.1
|