|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 782 occurrences of 335 keywords
|
|
|
Results
Found 2354 publication records. Showing 2354 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
54 | Ratna Dutta, Ee-Chien Chang, Sourav Mukhopadhyay |
Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
session key distribution, sensor network, computational security, self-healing, revocation |
54 | Paolo D'Arco |
On the Distribution of a Key Distribution Center. |
ICTCS |
2001 |
DBLP DOI BibTeX RDF |
Distributed Systems, Protocols, Key Distribution |
51 | Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang |
A Group Key Distribution Scheme with Decentralised User Join. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
Key distribution schemes, group key distribution schemes, user join, traceability, secure multicast, user revocation |
51 | Donggang Liu, Peng Ning, Kun Sun 0001 |
Efficient self-healing group key distribution with revocation capability. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
group key distribution, key management, self-healing |
49 | Liqun Chen 0002, Dieter Gollmann, Chris J. Mitchell |
Key distribution without individual trusted authentification servers. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
key distribution systems, authentication servers, key distribution protocols, cross checksum scheme, cryptography, trust, protocols, data integrity, message authentication, symmetric encryption |
46 | Sajid Hussain, Firdous Kausar, Ashraf Masood |
An efficient key distribution scheme for heterogeneous sensor networks. |
IWCMC |
2007 |
DBLP DOI BibTeX RDF |
security, key distribution, heterogeneous sensor networks, random key pre-distribution |
45 | Jie Zhou, Yong-hao Ou |
Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
Group Key Distribution Scheme, Key tree, Group member subtree, root ID algorithm, Chinese Remainder Theorem |
44 | Ratna Dutta, Sourav Mukhopadhyay |
Designing Scalable Self-healing Key Distribution Schemes with Revocation Capability. |
ISPA |
2007 |
DBLP DOI BibTeX RDF |
session key distribution, self-healing, revocation, rekeying |
43 | Seyit Ahmet Çamtepe, Bülent Yener |
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Massimiliano Listo |
Design of Self-Healing Key Distribution Schemes. |
Des. Codes Cryptogr. |
2004 |
DBLP DOI BibTeX RDF |
group communication, key distribution, self-healing |
42 | XuDong Qian, GuangQiang He, Guihua Zeng |
Realization of error correction and reconciliation of continuous quantum key distribution in detail. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
continuous quantum key distribution, reconciliation process, optimal partition of interval, SEC algorithm, estimation function |
42 | Lihao Xu, Cheng Huang |
Computation-Efficient Multicast Key Distribution. |
IEEE Trans. Parallel Distributed Syst. |
2008 |
DBLP DOI BibTeX RDF |
erasure decoding, Complexity, Multicast, computation, key distribution, MDS codes |
39 | Carlo Blundo, Paolo D'Arco, Vanesa Daza, Carles Padró |
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
Distributed Systems, Protocols, Key Distribution |
39 | Woo-Hun Kim, Kee-Young Yoo |
Group-Oriented Channel Protection for Mobile Devices in Digital Multimedia Broadcasting. |
ISCIS |
2005 |
DBLP DOI BibTeX RDF |
Digital multimedia broadcasting, Conditional access system, Channel grouping, Key distribution |
38 | Shirantha Wijesekera, Xu Huang 0001, Dharmendra Sharma 0001 |
Multi-Agent Based Approach for Quantum Key Distribution in WiFi Networks. |
KES-AMSTA |
2009 |
DBLP DOI BibTeX RDF |
Quantum Key Distribution (QKD), MAS, WiFi, 802.11i |
38 | Johann van der Merwe, Dawoud S. Dawoud, Stephen McDonald |
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
network level key distribution, Mobile ad hoc networks, key management, data dissemination, trust establishment, wireless network security |
37 | Morten Tranberg Hansen |
Asynchronous group key distribution on top of the cc2420 security mechanisms for sensor networks. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
cc2420 security, group key distribution, sensor network security |
36 | Jessica Staddon, Sara K. Miner, Matthew K. Franklin, Dirk Balfanz, Michael Malkin, Drew Dean |
Self-Healing Key Distribution with Revocation. |
S&P |
2002 |
DBLP DOI BibTeX RDF |
network packet loss, multicast, key distribution, self-healing, revocation, broadcast encryption |
36 | Germán Sáez |
Self-healing Key Distribution Schemes with Sponsorization. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Justin Goshi, Richard E. Ladner |
Algorithms for dynamic multicast key distribution. |
ACM J. Exp. Algorithmics |
2006 |
DBLP DOI BibTeX RDF |
Dynamic key distribution, multicast, experimental algorithms |
36 | Sahar Mohamed Ghanem, Hussein M. Abdel-Wahab |
A Simple XOR-Based Technique for Distributing Group Key in Secure Multicasting. |
ISCC |
2000 |
DBLP DOI BibTeX RDF |
Logical Hierarchical Key Tree, Key Distribution Center, Secure Multicasting |
35 | Qi Mi, John A. Stankovic, Radu Stoleru |
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks. |
WISEC |
2010 |
DBLP DOI BibTeX RDF |
wireless sensor networks, key distribution, secure localization |
35 | Sam Blackshear, Rakesh M. Verma |
R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
key distribution protocols, wireless sensor networks |
35 | Abedelaziz Mohaisen, Nam-Su Jho, Dowon Hong |
A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
security, wireless sensor network, key distribution, computation efficiency |
35 | Wei Du, Mingxing He, Xiao Li |
A New Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Networks. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
Self-healing Key Distribution, Constant Storage, Backward Security, Forward Security, WSNs |
35 | Daniele Micciancio, Saurabh Panjwani |
Optimal communication complexity of generic multicast key distribution. |
IEEE/ACM Trans. Netw. |
2008 |
DBLP DOI BibTeX RDF |
nested encryption, security, multicast, lower bounds, secret sharing, key distribution |
35 | Xing Liao, Shizhong Xu, Sheng Wang 0006, Kaiyu Zhou |
A Method of Pair-Wise Key Distribution and Management in Distributed Wireless Sensor Networks. |
MSN |
2007 |
DBLP DOI BibTeX RDF |
Distributed wireless sensor networks, key distribution and management, pair-wise key, scalable |
34 | Reihaneh Safavi-Naini, Shaoquan Jiang |
Non-interactive conference key distribution and its applications. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
conference key distribution, ring authentication, broadcast encryption, unconditional security |
34 | Fengguang An, Xiuzhen Cheng 0001, Jose Manny Rivera, Jiang Li 0009, Z. Cheng |
PKM: A Pairwise Key Management Scheme for Wireless Sensor Networks. |
ICCNMC |
2005 |
DBLP DOI BibTeX RDF |
security, Sensor networks, key management, key distribution |
33 | Xu Huang 0001, Dharmendra Sharma 0001 |
An Agent-Oriented Quantum Key Distribution for Wi-Fi Network Security. |
KES (3) |
2008 |
DBLP DOI BibTeX RDF |
an agent-oriented Quantum Key Distribution, B92 protocol, BB84 protocol, Socket Programming, 802.11, Wi-Fi |
33 | Gloria Rinaldi |
Key Distribution Patterns Using Tangent Circle Structures. |
Des. Codes Cryptogr. |
2004 |
DBLP DOI BibTeX RDF |
Laguerre geometries, Minkowski geometries, cryptography, key distribution |
33 | Yu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyuan Wang |
Practical Key Distribution Schemes for Channel Protection. |
COMPSAC |
2000 |
DBLP DOI BibTeX RDF |
channel protection, network security and key distribution scheme, Pay-per-view |
33 | Mahmoud T. El-Hadidi, Nadia Hamed Hegazi, Heba Kamal Aslan |
Performance Evaluation of a New Hybrid Encryption Protocol for Authentication and Key Distribution. |
ISCC |
1999 |
DBLP DOI BibTeX RDF |
Authentication, Performance Analysis, Key Distribution, Hybrid Encryption |
33 | Javier Salido, Loukas Lazos, Radha Poovendran |
Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach. |
IEEE/ACM Trans. Netw. |
2007 |
DBLP DOI BibTeX RDF |
security, multicast, key management, Ad hoc, key distribution, secure group communication |
33 | Trevor Perrin |
Public key distribution through "cryptoIDs". |
NSPW |
2003 |
DBLP DOI BibTeX RDF |
cryptoIDs, key management, fingerprints, key distribution, public key infrastructure |
33 | Eiji Okamoto, K. Nakamura |
Lifetimes of Keys in Cryptographic Key Management Systems. |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
|
33 | Haowen Chan, Virgil D. Gligor, Adrian Perrig, Gautam Muralidharan |
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. |
IEEE Trans. Dependable Secur. Comput. |
2005 |
DBLP DOI BibTeX RDF |
security, Sensor networks, distributed algorithms, key management, key distribution, revocation |
33 | Sandeep S. Kulkarni, Bezawada Bruhadeshwar |
Distributing Key Updates in Secure Dynamic Groups. |
ICDCIT |
2004 |
DBLP DOI BibTeX RDF |
Descendent Tracking, Identifier Assignment, Key Distribution, Secure Multicast |
32 | Germán Sáez |
On Threshold Self-healing Key Distribution Schemes. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Ratna Dutta, Sourav Mukhopadhyay, Sabu Emmanuel |
Low Bandwidth Self-Healing Key Distribution for Broadcast Encryption. |
Asia International Conference on Modelling and Simulation |
2008 |
DBLP DOI BibTeX RDF |
wireless sensor network, key distribution, self-healing |
32 | Qingyu Xu, Mingxing He |
Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
key distribution self-healing, storage complexity, wireless sensor network, computational secure, unconditional secure, key revocation |
32 | Wei Du, Mingxing He |
Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
security, Key distribution, self-healing, WSNs, collusion attack |
32 | Naya Nagy, Selim G. Akl |
Quantum Authenticated Key Distribution. |
UC |
2007 |
DBLP DOI BibTeX RDF |
authentication, entanglement, quantum key distribution |
32 | Hoi-Kwong Lo, Hoi Fung Chau, M. Ardehali |
Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security. |
J. Cryptol. |
2005 |
DBLP DOI BibTeX RDF |
Quantum computing, Key distribution, Quantum cryptography, Quantum information |
32 | Taeshik Shon, Jongsub Moon, HongMin Choi |
Effciency Evaluation for Key Distribution Models in Satellite Terminals. |
INTELLCOMM |
2004 |
DBLP DOI BibTeX RDF |
satellite security, performance evaluation, key distribution |
31 | Seyit Ahmet Çamtepe, Bülent Yener |
Combinatorial design of key distribution mechanisms for wireless sensor networks. |
IEEE/ACM Trans. Netw. |
2007 |
DBLP DOI BibTeX RDF |
combinatorial design theory, generalized quadrangles (GQ), key pre-distribution (deterministic and hybrid), key-chains, security in wireless sensor networks (WSN), symmetric balanced incomplete block design (BIBD), key management |
30 | Kyawt Kyawt Khaing, Khin Mi Mi Aung |
Secured Key Distribution Scheme for Cryptographic Key Management System. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
Key Management System, Key Distribution Scheme, Encryption, rekeying |
30 | Ling Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo |
Self-organised group key management for ad hoc networks. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
Ad hoc network, key distribution, privacy homomorphism |
30 | Shirantha Wijesekera, Sajal Palit, Bala Balachandran |
Software Development for B92 Quantum Key Distribution Communication Protocol. |
ACIS-ICIS |
2007 |
DBLP DOI BibTeX RDF |
Quantum Key Distribution (QKD), B92, BB84, QBER, Socket Programming, TCP/IP, IPsec |
30 | Paulo F. Oliveira, João Barros |
Network Coding Protocols for Secret Key Distribution. |
OTM Conferences (2) |
2007 |
DBLP DOI BibTeX RDF |
secret key distribution, sensor networks, network coding |
30 | Seo-Il Kang, Deok-Gyu Lee, Im-Yeong Lee |
A Study on Key Distribution and ID Registration in the AAA System for Ubiquitous Multimedia Environments. |
MMM (2) |
2007 |
DBLP DOI BibTeX RDF |
ID registration, Authentication, key distribution, Multimedia service |
30 | Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury |
A Proof of the Security of Quantum Key Distribution. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
Information versus disturbance, Quantum security, Quantum information, Quantum key distribution |
30 | Tian-Fu Lee, Tzonelih Hwang |
Improved conference key distribution protocol based on a symmetric balanced incomplete block design. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
conference key distribution system, symmetric balanced incomplete block design, distributed systems, cryptography, key agreement |
29 | Biming Tian, Song Han 0004, Tharam S. Dillon |
A Self-Healing and Mutual-Healing Key Distribution Scheme Using Bilinear Pairings for Wireless Networks. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Adrian Perrig, Dawn Xiaodong Song, J. D. Tygar |
ELK, A New Protocol for Efficient Large-Group Key Distribution. |
S&P |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Kouichi Sakurai, Tsuyoshi Takagi |
On the Security of a Modified Paillier Public-Key Primitive. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
One-wayness, Composite residuosity problem, Paillier cryptosystem, Factoring, Key distribution, Chosen ciphertext attack |
29 | Shingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai |
Toward Fair International Key Escrow. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Key escrow/recovery system, Diffie-Hellman key distribution, Distributed Cryptography, Security policy, Trusted Third Party |
29 | Yu-Lun Huang, Shiuh-Pyng Shieh, Fu-Shen Ho, Jian-Chyuan Wang |
Efficient key distribution schemes for secure media delivery in pay-TV systems. |
IEEE Trans. Multim. |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Wen-Shenq Juang |
Efficient User Authentication and Key Agreement in Wireless Sensor Networks. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
shared key distribution, session key agreement, sensor networks, authentication, network security, key distribution |
29 | Lein Harn, David Huang |
A Protocol for Establishing Secure Communication Channels in a Large Network. |
IEEE Trans. Knowl. Data Eng. |
1994 |
DBLP DOI BibTeX RDF |
secure communication channels, open media, large distributed network, data attack vulnerability, data encryption/decryption techniques, secret session key, locally trusted centers, public-key distribution, RSA encryption scheme, authentication, protocols, protocol, computer networks, public key cryptography, security of data, key distribution, information access, data storage, data transformation, telecommunication channels, multi-user system, knowledge exchange |
29 | Michel Abdalla, Pierre-Alain Fouque, David Pointcheval |
Password-Based Authenticated Key Exchange in the Three-Party Setting. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Password, key distribution, authenticated key exchange, multi-party protocols |
28 | Hao Wen, Zhengfu Han, Yibo Zhao, Guangcan Guo, Peilin Hong |
Multiple stochastic paths scheme on partially-trusted relay quantum key distribution network. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
quantum network, trusted relay, security, stochastic, quantum key distribution |
28 | Ratna Dutta, Sourav Mukhopadhyay, Amitabha Das, Sabu Emmanuel |
Generalized Self-healing Key Distribution Using Vector Space Access Structure. |
Networking |
2008 |
DBLP DOI BibTeX RDF |
forward and backward secrecy, wireless network, computational security, key distribution, self-healing, access structure |
28 | Tzonelih Hwang, Kuo-Chang Lee, Chuan-Ming Li |
Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
three-party key distribution protocol, provable security, Quantum cryptography |
28 | Solange Ghernaouti-Helie, Mohamed Ali Sfaxi |
Upgrading PPP security by Quantum Key Distribution. |
Net-Con |
2005 |
DBLP DOI BibTeX RDF |
PPP, Quantum Key Distribution (QKD) within PPP, unconditional security transmission, data-link layer security, enhance PPP security, application domain, feasibility study |
28 | Dagmar Bruß, Norbert Lütkenhaus |
Quantum Key Distribution: from Principles to Practicalities. |
Appl. Algebra Eng. Commun. Comput. |
2000 |
DBLP DOI BibTeX RDF |
Quantum cryptography, Quantum information, Quantum key distribution |
28 | Fu-Yuan Lee, Shiuh-Pyng Shieh |
Scalable and lightweight key distribution for secure group communications. |
Int. J. Netw. Manag. |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Shin-ya Tanaka, Fumiaki Sato |
A Key Distribution and Rekeying Framework with Totally Ordered Multicast Protocols. |
ICOIN |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Ueli M. Maurer, Yacov Yacobi |
A Remark on a Non-interactive Public-Key Distribution System. |
EUROCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
28 | Rakeshbabu Bobba, Himanshu Khurana |
DLPKH - Distributed Logical Public-Key Hierarchy. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
decentralized key distribution, logical key hierarchy, public-key trees, key agreement, Group key management |
28 | Paolo D'Arco, Douglas R. Stinson |
On Unconditionally Secure Robust Distributed Key Distribution Centers. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Stephen M. Matyas |
Public-Key Registration. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
|
28 | Wenbo Shi, Injoo Jang, Hyeong Seon Yoo |
A Provable Secure Authentication Protocol Given Forward Secure Session Key. |
APWeb |
2008 |
DBLP DOI BibTeX RDF |
forward secure session key, authentication, key distribution |
27 | Thomas Lorünser, Edwin Querasser, Thomas Matyus, Momtchil Peev, Johannes Wolkerstorfer, Michael Hutter, Alexander Szekely, Ilse Wimberger, Christian Pfaffel-Janser, Andreas Neppach |
Security processor with quantum key distribution. |
ASAP |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Shahrokh Saeednia, Reihaneh Safavi-Naini |
Efficient Identity-Based Conference Key Distribution Protocols. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
Security classes, Identity-based, Conference key |
27 | Yujin Lim, Sanghyun Ahn |
Improvement of the Naive Group Key Distribution Approach for Mobile Ad Hoc Networks. |
MSN |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Antony Chung, Utz Roedig |
DHB-KEY: An efficient key distribution scheme for wireless sensor networks. |
MASS |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Xiaolong Li, Yaping Lin, Siqing Yang, Yeqing Yi, Jianping Yu, Xinguo Lu |
A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networks. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Junqi Zhang, Vijay Varadharajan, Yi Mu 0001 |
Securing XML Document Sources and Their Distribution. |
AINA (1) |
2004 |
DBLP DOI BibTeX RDF |
XML contents, Author-X, encryption, key distribution |
27 | B. R. Purushothama, B. B. Amberker |
Secure group key management scheme for simultaneous multiple groups with overlapped memberships using binomial key tree with new approach to key distribution and key computation. |
Int. J. Trust. Manag. Comput. Commun. |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Fuwen Liu, Hartmut König |
Secure and efficient key distribution for collaborative applications. |
CollaborateCom |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Chris Carroll, Yair Frankel, Yiannis Tsiounis |
Efficient Key Distribution for Slow Computing Devices: Achieving Fast Over the Air Activation for Wireless Systems. |
S&P |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Ratna Dutta, Yongdong Wu, Sourav Mukhopadhyay |
Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Carlo Blundo, Paolo D'Arco, Alfredo De Santis |
On Self-Healing Key Distribution Schemes. |
IEEE Trans. Inf. Theory |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Hui-Feng Huang, Chin-Chen Chang 0001 |
A Novel Conference Key Distribution System with Re-keying Protocol. |
Human.Society@Internet |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Carlo Blundo, Paolo D'Arco, Alfredo De Santis |
Definitions and Bounds for Self-Healing Key Distribution Schemes. |
ICALP |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Massimo Tornatore, Simone Ceresa, Paolo Giacomazzi |
A novel statistical model of users' behavior in key distribution schemes. |
BROADNETS |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Mengyao Zhu, Ming Zhang 0001, Xiaoling Chen, Ding Zhang, Zhijie Huang |
A Hierarchical Key Distribution Scheme for Conditional Access System in DTV Broadcasting. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Eiji Okamoto |
Key Distribution Systems Based on Identification Information. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
|
25 | Bin Ni, Naveen Santhapuri, Srihari Nelakuditi |
Wireless network coding and concurrent MAC: are these approaches complementary? |
ACM SIGMOBILE Mob. Comput. Commun. Rev. |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Juliano F. Kazienko, Célio Vinicius N. de Albuquerque |
Secure Secret Key Distribution and Storage in Wireless Sensor Networks. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
key storage, security, WSN, key distribution |
25 | Liang Hu 0001, Hongtu Li, Jianfen Chu, Hongwei Li, Wei Yan |
Registration and Private Key Distribution Protocol Based on IBE. |
FCST |
2010 |
DBLP DOI BibTeX RDF |
private key distribution, private key replacing, KCI, authentication, Identity-Based Encryption |
25 | Hyeopgeon Lee, Kyounghwa Lee, Yongtae Shin |
An Enhanced Key Distribution Scheme for the Energy Consumption and the Security in the Wireless Sensor Networks. |
SAINT |
2010 |
DBLP DOI BibTeX RDF |
Sensor Network, Key Distribution, ZigBee |
25 | Stefan Rass, Peter Schartner |
Non-interactive Information Reconciliation for Quantum Key Distribution. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
Error Correcting Codes, Information-Theoretic Security, Channel Coding, Quantum Key Distribution, Information Reconciliation |
25 | Chang-Qing Gong, Hong-yuan Zhou, Jian-li Feng |
Research on Reconciliation Algorithm in Quantum Key Distribution. |
HIS (1) |
2009 |
DBLP DOI BibTeX RDF |
protocol binary, simulation, reconciliation, quantum key distribution, CRC |
25 | M. Amir Moulavi, Jalal A. Nasiri, Behnam Bahmani, Hossein Parvar, M. Sadeghizadeh, Mahmoud Naghibzadeh |
DHA-KD: Dynamic Hierarchical Agent Based Key Distribution in Group Communication. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
Agent, Group Communication, Bandwidth, Key Distribution, Hierarchical |
25 | Zonghua Liu, Guangqing Liu, Byungwook Lee |
An Efficient Key Distribution Method Applying to OMA DRM 2.0 with Device Identifier. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
Key Distribution Method, symmetric algorithm, asymmetric algorithm |
25 | Weichao Wang, Bharat K. Bhargava |
Key distribution and update for secure inter-group multicast communication. |
SASN |
2005 |
DBLP DOI BibTeX RDF |
inter-group communication, key distribution and update, security |
25 | Kuen-Pin Wu, Shanq-Jang Ruan, Feipei Lai, Chih-Kuang Tseng |
On Key Distribution in Secure Multicasting. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
video-conferencing systems, authorized recipients, message encryption, secure filter, cryptography, distributed processing, key distribution, teleconferencing, multicast communication, distributed environment, telecommunication security, secure multicasting, group key, pay per view |
25 | Mike Just, Evangelos Kranakis, Danny Krizanc, Paul C. van Oorschot |
On Key Distribution via True Broadcasting. |
CCS |
1994 |
DBLP DOI BibTeX RDF |
secret sharing, key distribution, broadcast encryption |
Displaying result #1 - #100 of 2354 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|