|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 65 occurrences of 49 keywords
|
|
|
Results
Found 41 publication records. Showing 41 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
80 | Cheng-Fen Lu, Shiuh-Pyng Winston Shieh |
Secure Key-Evolving Protocols for Discrete Logarithm Schemes. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
Key-Evolving, Backward-Secrecy, Key Management, Forward-Secrecy |
78 | Chin-Chen Chang 0001, Jung-San Lee, Chang-Chu Chen |
On the Forward and Backward Secrecy of HLL Group Key Exchange Mechanism. |
CIT |
2005 |
DBLP DOI BibTeX RDF |
the forward secrecy, the backward secrecy, multicast communication, group key exchange |
47 | Ratna Dutta, Sourav Mukhopadhyay, Amitabha Das, Sabu Emmanuel |
Generalized Self-healing Key Distribution Using Vector Space Access Structure. |
Networking |
2008 |
DBLP DOI BibTeX RDF |
forward and backward secrecy, wireless network, computational security, key distribution, self-healing, access structure |
47 | Dhilak Damodaran, Rohit Singh 0004, Phu Dung Le |
Group Key Management in Wireless Networks Using Session Keys. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
Forward and Backward Secrecy, Multicast, Wireless, Portable, Group Key, Session Keys |
39 | Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang |
A Secure Re-keying Scheme with Key Recovery Property. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
32 | Hani Alzaid, DongGook Park, Juan Manuel González Nieto, Ernest Foo |
Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
sandwich attack, forward and backward secrecy, supervisory control and data acquisition, wireless sensor network, key management, node, process control systems |
32 | Diana Berbecaru, Luca Albertalli |
An Optimized Double Cache Technique for Efficient Use of Forward-secure Signature Schemes. |
PDP |
2008 |
DBLP DOI BibTeX RDF |
generic FSS schemes, double cache technique, backward secrecy |
32 | Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia |
Efficient and secure keys management for wireless mobile communications. |
POMC |
2002 |
DBLP DOI BibTeX RDF |
backward secrecy, network dynamics management, cryptography, distributed algorithms, wireless communications, key distribution, secure multicast, forward secrecy, collusion, key generation, key management protocol |
30 | Maw-Jinn Tsaur, Wei-Chi Ku, Hao-Rung Chung |
An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Wei Du, Mingxing He, Xiao Li |
A New Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Networks. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
Self-healing Key Distribution, Constant Storage, Backward Security, Forward Security, WSNs |
24 | Woei-Jiunn Tsaur, Haw-Tyng Pai |
Dynamic Key Management Schemes for Secure Group Communication Based on Hierarchical Clustering in Mobile AdHocNetworks. |
ISPA Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Ratna Dutta, Sourav Mukhopadhyay |
Designing Scalable Self-healing Key Distribution Schemes with Revocation Capability. |
ISPA |
2007 |
DBLP DOI BibTeX RDF |
session key distribution, self-healing, revocation, rekeying |
24 | Chin-Chen Chang 0001, Yu-Wei Su, Iuon-Chang Lin |
A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress. |
Infoscale |
2007 |
DBLP DOI BibTeX RDF |
multicast key management, broadcast encryption |
24 | Liming Wang, Chuan-Kun Wu |
Authenticated Group Key Agreement for Multicast. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Wei Wang 0105, Jianfeng Ma 0001, Sang-Jae Moon |
Ternary Tree Based Group Key Management in Dynamic Peer Networks. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Sheng-Jung Yu, Yu-Chi Lee, Liang-Hsin Lin, Chia-Hsiang Yang |
An Energy-Efficient Double Ratchet Cryptographic Processor With Backward Secrecy for IoT Devices. |
IEEE J. Solid State Circuits |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Sourabh Bhaskar, Keyur Parmar, Devesh C. Jinwala |
Escrow and Pairing Free CP-ABE Scheme with Forward and Backward Secrecy for Healthcare Internet of Things. |
ICISS |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Suryakanta Panda, Samrat Mondal, Rinku Dewri, Ashok Kumar Das |
Towards achieving efficient access control of medical data with both forward and backward secrecy. |
Comput. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
22 | E. Haodudin Nurkifli, Tzonelih Hwang |
A Secure Lightweight Authentication Scheme in IoT Environment with Perfect Forward and Backward Secrecy. |
IWBIS |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Yingying Yao, Xiaolin Chang, Jianhua Wang, Jelena V. Misic, Vojislav B. Misic, Hong Wang 0027 |
LPC: A lightweight pseudonym changing scheme with robust forward and backward secrecy for V2X. |
Ad Hoc Networks |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Sheng-Jung Yu, Yu-Chi Lee, Chia-Hsiang Yang |
A 1.18mW Double Ratchet Cryptographic Processor with Backward Secrecy for IoT Devices. |
A-SSCC |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Hua Guo, Yandong Zheng, Xiyong Zhang, Zhoujun Li |
Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks. |
Sensors |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Kannan Karthik |
Key search and adaptation based on association rules for backward secrecy. |
WIFS |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Jung-San Lee, Chin-Chen Chang 0001, Kuo-Jui Wei |
Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy. |
Int. J. Netw. Secur. |
2013 |
DBLP BibTeX RDF |
|
22 | Tomasz Rams, Piotr Pacyna |
Long-Lived Self-Healing Group Key Distribution Scheme with Backward Secrecy. |
NetSys |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Roberto Di Pietro, Antonio Durante, Luigi V. Mancini, Vishwas Patil |
Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Chin-Tser Huang, J. Morris Chang |
Responding to Security Issues in WiMAX Networks. |
IT Prof. |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Po-Yuan Teng, Shih-I Huang, Adrian Perrig |
Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Ratna Dutta, Sourav Mukhopadhyay, Sabu Emmanuel |
Low Bandwidth Self-Healing Key Distribution for Broadcast Encryption. |
Asia International Conference on Modelling and Simulation |
2008 |
DBLP DOI BibTeX RDF |
wireless sensor network, key distribution, self-healing |
15 | Qingyu Xu, Mingxing He |
Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
key distribution self-healing, storage complexity, wireless sensor network, computational secure, unconditional secure, key revocation |
15 | Wei Du, Mingxing He |
Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
security, Key distribution, self-healing, WSNs, collusion attack |
15 | Ke Qin, Mingtian Zhou, Naiqi Liu, Yujie Hao, Jiandong Guo |
A Novel Group Key Management Based on Jacobian Elliptic Chebyshev Rational Map. |
NPC |
2007 |
DBLP DOI BibTeX RDF |
Jacobian Elliptic Chebyshev Rational Map, group key management, secure multicast |
15 | Ratna Dutta, Yongdong Wu, Sourav Mukhopadhyay |
Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Hung-Min Sun, Chien-Ming Chen 0001, Feng-Ying Chu |
An Efficient and Scalable Key Management Protocol for Secure Group Communications in Wireless Sensor Networks. |
ISCC |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Yixin Jiang, Chuang Lin 0002, Minghui Shi, Xuemin Shen |
Multiple Key Sharing and Distribution Scheme With (n, t) Threshold for NEMO Group Communications. |
IEEE J. Sel. Areas Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Wei-Chi Ku, Min-Hung Chiang, Shen-Tien Chang |
Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme. |
ACM SIGOPS Oper. Syst. Rev. |
2005 |
DBLP DOI BibTeX RDF |
hash function, password authentication, guessing attack, denial-of-service attack, stolen-verifier attack |
15 | Heeyoul Kim, Seong-Min Hong 0001, Hyunsoo Yoon, Jung Wan Cho |
Secure Group Communication with Multiplicative One-way Functions. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
key update, security, cryptographic protocols, secure group communication, group key management |
15 | Hao Yin, Xiaowen Chu 0001, Chuang Lin 0002, Feng Qiu, Geyong Min |
A Novel Key Management and Distribution Solution for Secure Video Multicast. |
PCM (2) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Josep Pegueroles, Wang Bin, Miguel Soriano, Francisco Rico-Novella |
Group Rekeying Algorithm Using Pseudo-random Functions and Modular Reduction. |
GCC (1) |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Ritesh Mukherjee, J. William Atwood |
Proxy Encryptions for Secure Multicast Key Management. |
LCN |
2003 |
DBLP DOI BibTeX RDF |
|
15 | K. C. Reddy, Divya Nalla |
Identity Based Authenticated Group Key Agreement Protocol. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
key trees, one-way function trees, cryptography, elliptic curves, Key Agreement, group Key Agreement, Diffie-Hellman, Key Agreement Protocols, ID-based, Identity based, Weil pairing |
Displaying result #1 - #41 of 41 (100 per page; Change: )
|
|