The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Backward-Secrecy (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2006 (15) 2007-2009 (15) 2010-2023 (11)
Publication types (Num. hits)
article(8) inproceedings(33)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 65 occurrences of 49 keywords

Results
Found 41 publication records. Showing 41 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
80Cheng-Fen Lu, Shiuh-Pyng Winston Shieh Secure Key-Evolving Protocols for Discrete Logarithm Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Key-Evolving, Backward-Secrecy, Key Management, Forward-Secrecy
78Chin-Chen Chang 0001, Jung-San Lee, Chang-Chu Chen On the Forward and Backward Secrecy of HLL Group Key Exchange Mechanism. Search on Bibsonomy CIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF the forward secrecy, the backward secrecy, multicast communication, group key exchange
47Ratna Dutta, Sourav Mukhopadhyay, Amitabha Das, Sabu Emmanuel Generalized Self-healing Key Distribution Using Vector Space Access Structure. Search on Bibsonomy Networking The full citation details ... 2008 DBLP  DOI  BibTeX  RDF forward and backward secrecy, wireless network, computational security, key distribution, self-healing, access structure
47Dhilak Damodaran, Rohit Singh 0004, Phu Dung Le Group Key Management in Wireless Networks Using Session Keys. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Forward and Backward Secrecy, Multicast, Wireless, Portable, Group Key, Session Keys
39Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang A Secure Re-keying Scheme with Key Recovery Property. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
32Hani Alzaid, DongGook Park, Juan Manuel González Nieto, Ernest Foo Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF sandwich attack, forward and backward secrecy, supervisory control and data acquisition, wireless sensor network, key management, node, process control systems
32Diana Berbecaru, Luca Albertalli An Optimized Double Cache Technique for Efficient Use of Forward-secure Signature Schemes. Search on Bibsonomy PDP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF generic FSS schemes, double cache technique, backward secrecy
32Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia Efficient and secure keys management for wireless mobile communications. Search on Bibsonomy POMC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF backward secrecy, network dynamics management, cryptography, distributed algorithms, wireless communications, key distribution, secure multicast, forward secrecy, collusion, key generation, key management protocol
30Maw-Jinn Tsaur, Wei-Chi Ku, Hao-Rung Chung An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Wei Du, Mingxing He, Xiao Li A New Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Networks. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Self-healing Key Distribution, Constant Storage, Backward Security, Forward Security, WSNs
24Woei-Jiunn Tsaur, Haw-Tyng Pai Dynamic Key Management Schemes for Secure Group Communication Based on Hierarchical Clustering in Mobile AdHocNetworks. Search on Bibsonomy ISPA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Ratna Dutta, Sourav Mukhopadhyay Designing Scalable Self-healing Key Distribution Schemes with Revocation Capability. Search on Bibsonomy ISPA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF session key distribution, self-healing, revocation, rekeying
24Chin-Chen Chang 0001, Yu-Wei Su, Iuon-Chang Lin A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress. Search on Bibsonomy Infoscale The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multicast key management, broadcast encryption
24Liming Wang, Chuan-Kun Wu Authenticated Group Key Agreement for Multicast. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Wei Wang 0105, Jianfeng Ma 0001, Sang-Jae Moon Ternary Tree Based Group Key Management in Dynamic Peer Networks. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Sheng-Jung Yu, Yu-Chi Lee, Liang-Hsin Lin, Chia-Hsiang Yang An Energy-Efficient Double Ratchet Cryptographic Processor With Backward Secrecy for IoT Devices. Search on Bibsonomy IEEE J. Solid State Circuits The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Sourabh Bhaskar, Keyur Parmar, Devesh C. Jinwala Escrow and Pairing Free CP-ABE Scheme with Forward and Backward Secrecy for Healthcare Internet of Things. Search on Bibsonomy ICISS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Suryakanta Panda, Samrat Mondal, Rinku Dewri, Ashok Kumar Das Towards achieving efficient access control of medical data with both forward and backward secrecy. Search on Bibsonomy Comput. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22E. Haodudin Nurkifli, Tzonelih Hwang A Secure Lightweight Authentication Scheme in IoT Environment with Perfect Forward and Backward Secrecy. Search on Bibsonomy IWBIS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Yingying Yao, Xiaolin Chang, Jianhua Wang, Jelena V. Misic, Vojislav B. Misic, Hong Wang 0027 LPC: A lightweight pseudonym changing scheme with robust forward and backward secrecy for V2X. Search on Bibsonomy Ad Hoc Networks The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Sheng-Jung Yu, Yu-Chi Lee, Chia-Hsiang Yang A 1.18mW Double Ratchet Cryptographic Processor with Backward Secrecy for IoT Devices. Search on Bibsonomy A-SSCC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Hua Guo, Yandong Zheng, Xiyong Zhang, Zhoujun Li Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks. Search on Bibsonomy Sensors The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Kannan Karthik Key search and adaptation based on association rules for backward secrecy. Search on Bibsonomy WIFS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Jung-San Lee, Chin-Chen Chang 0001, Kuo-Jui Wei Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2013 DBLP  BibTeX  RDF
22Tomasz Rams, Piotr Pacyna Long-Lived Self-Healing Group Key Distribution Scheme with Backward Secrecy. Search on Bibsonomy NetSys The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Roberto Di Pietro, Antonio Durante, Luigi V. Mancini, Vishwas Patil Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Chin-Tser Huang, J. Morris Chang Responding to Security Issues in WiMAX Networks. Search on Bibsonomy IT Prof. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Po-Yuan Teng, Shih-I Huang, Adrian Perrig Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Ratna Dutta, Sourav Mukhopadhyay, Sabu Emmanuel Low Bandwidth Self-Healing Key Distribution for Broadcast Encryption. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2008 DBLP  DOI  BibTeX  RDF wireless sensor network, key distribution, self-healing
15Qingyu Xu, Mingxing He Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF key distribution self-healing, storage complexity, wireless sensor network, computational secure, unconditional secure, key revocation
15Wei Du, Mingxing He Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, Key distribution, self-healing, WSNs, collusion attack
15Ke Qin, Mingtian Zhou, Naiqi Liu, Yujie Hao, Jiandong Guo A Novel Group Key Management Based on Jacobian Elliptic Chebyshev Rational Map. Search on Bibsonomy NPC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Jacobian Elliptic Chebyshev Rational Map, group key management, secure multicast
15Ratna Dutta, Yongdong Wu, Sourav Mukhopadhyay Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Hung-Min Sun, Chien-Ming Chen 0001, Feng-Ying Chu An Efficient and Scalable Key Management Protocol for Secure Group Communications in Wireless Sensor Networks. Search on Bibsonomy ISCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Yixin Jiang, Chuang Lin 0002, Minghui Shi, Xuemin Shen Multiple Key Sharing and Distribution Scheme With (n, t) Threshold for NEMO Group Communications. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Wei-Chi Ku, Min-Hung Chiang, Shen-Tien Chang Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF hash function, password authentication, guessing attack, denial-of-service attack, stolen-verifier attack
15Heeyoul Kim, Seong-Min Hong 0001, Hyunsoo Yoon, Jung Wan Cho Secure Group Communication with Multiplicative One-way Functions. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF key update, security, cryptographic protocols, secure group communication, group key management
15Hao Yin, Xiaowen Chu 0001, Chuang Lin 0002, Feng Qiu, Geyong Min A Novel Key Management and Distribution Solution for Secure Video Multicast. Search on Bibsonomy PCM (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Josep Pegueroles, Wang Bin, Miguel Soriano, Francisco Rico-Novella Group Rekeying Algorithm Using Pseudo-random Functions and Modular Reduction. Search on Bibsonomy GCC (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Ritesh Mukherjee, J. William Atwood Proxy Encryptions for Secure Multicast Key Management. Search on Bibsonomy LCN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15K. C. Reddy, Divya Nalla Identity Based Authenticated Group Key Agreement Protocol. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF key trees, one-way function trees, cryptography, elliptic curves, Key Agreement, group Key Agreement, Diffie-Hellman, Key Agreement Protocols, ID-based, Identity based, Weil pairing
Displaying result #1 - #41 of 41 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license