Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks (Englisch)
- Neue Suche nach: Ma, C.
- Neue Suche nach: Cheng, R.
- Neue Suche nach: Ma, C.
- Neue Suche nach: Cheng, R.
- Neue Suche nach: Pei, Dingyi
In:
Information security and cryptology: third SKLOIS conference, INSCRYPT 2007
4990
;
182-191
;
2008
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks
-
Beteiligte:
-
Kongress:Conference; 3rd, Information security and cryptology: third SKLOIS conference, INSCRYPT 2007 ; 2007 ; Xining, China
-
Erschienen in:LECTURE NOTES IN COMPUTER SCIENCE , 4990 ; 182-191
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Berlin
-
Erscheinungsdatum:01.01.2008
-
Format / Umfang:10 pages
-
Anmerkungen:Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Cryptanalysis of the SFLASH Signature Scheme (Extended Abstract)Dubois, V. / Fouque, P.-A. / Shamir, A. / Stern, J. et al. | 2008
- 5
-
On the Evolution of User Authentication: Non-bilateral FactorsYung, M. et al. | 2008
- 11
-
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted MessageTso, R. / Okamoto, T. / Okamoto, E. et al. | 2008
- 25
-
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal ConvertibilityWu, W. / Mu, Y. / Susilo, W. / Huang, X. et al. | 2008
- 40
-
An Efficient ID-Based Proxy Signature Scheme from PairingsGu, C. / Zhu, Y. et al. | 2008
- 51
-
Improved and Multiple Linear Cryptanalysis of Reduced Round SerpentCollard, B. / Standaert, F.-X. / Quisquater, J.-J. et al. | 2008
- 66
-
Linear Slide Attacks on the KeeLoq Block CipherBogdanov, A. et al. | 2008
- 81
-
A Key Predistribution Scheme Based on 3-DesignsDong, J. / Pei, D. / Wang, X. et al. | 2008
- 93
-
Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA SettingWang, W. / Hu, L. / Li, Y. et al. | 2008
- 108
-
A Provably Secure One-Pass Two-Party Key Establishment ProtocolChalkias, K. / Halkidis, S.T. / Hristu-Varsakelis, D. / Stephanides, G. / Alexiadis, A. et al. | 2008
- 123
-
Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard AssumptionDeng, Y. / Lin, D. et al. | 2008
- 138
-
Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious AdversariesMouffron, M. / Rousseau, F. / Zhu, H. et al. | 2008
- 153
-
A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge ExtractorDing, N. / Gu, D. et al. | 2008
- 167
-
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access StructuresTartary, C. / Pieprzyk, J. / Wang, H. et al. | 2008
- 182
-
Key Management Based on Hierarchical Secret Sharing in Ad-Hoc NetworksMa, C. / Cheng, R. et al. | 2008
- 192
-
Probablistic (n, n) Visual Secret Sharing Scheme for Grayscale ImagesWang, D. / Li, X. / Yi, F. et al. | 2008
- 201
-
Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic AttacksHinai, S.A. / Batten, L.M. / Colbert, B. et al. | 2008
- 216
-
Four Families of Binary Sequences with Low Correlation and Large Linear ComplexityWang, J.-S. / Qi, W.-F. et al. | 2008
- 231
-
Pseudo-Randomness of Discrete-Log Sequences from Elliptic CurvesChen, Z. / Zhang, N. / Xiao, G. et al. | 2008
- 246
-
Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter GeneratorsKolokotronis, N. / Limniotis, K. / Kalouptsidis, N. et al. | 2008
- 256
-
Linear Equation on Polynomial Single Cycle T-FunctionsWang, J.-S. / Qi, W.-F. et al. | 2008
- 271
-
Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of VariablesQu, L. / Li, C. et al. | 2008
- 283
-
Anonymity and k-Choice IdentitiesCichon, J. / Kutylowski, M. et al. | 2008
- 298
-
Deniable Authentication on the Internet (Extended Abstract)Jiang, S. et al. | 2008
- 313
-
Orthogonality between Key Privacy and Data Privacy, RevisitedZhang, R. / Hanaoka, G. / Imai, H. et al. | 2008
- 328
-
Unlinkable Randomizable Signature and Its Application in Group SignatureZhou, S. / Lin, D. et al. | 2008
- 343
-
An Improved Collision Attack on MD5 AlgorithmChen, S. / Jin, C. et al. | 2008
- 358
-
Multivariates Polynomials for HashingDing, J. / Yang, B.-Y. et al. | 2008
- 372
-
Efficient Public Key Encryption with Keyword Search Schemes from PairingsGu, C. / Zhu, Y. / Pan, H. et al. | 2008
- 384
-
Multi-Identity Single-Key Decryption without Random OraclesGuo, F. / Mu, Y. / Chen, Z. / Xu, L. et al. | 2008
- 399
-
Kipnis-Shamir Attack on HFE RevisitedJiang, X. / Ding, J. / Hu, L. et al. | 2008
- 412
-
Cryptanalysis of General Lu-Lee Type SystemsZhou, H. / Luo, P. / Wang, D. / Dai, Y. et al. | 2008
- 427
-
A Timing-Resistant Elliptic Curve Backdoor in RSAYoung, A.L. / Yung, M. et al. | 2008
- 442
-
A Watermarking Scheme in the Encrypted Domain for Watermarking ProtocolZhao, B. / Dang, L. / Kou, W. / Zhang, J. / Li, Z. / Fan, K. et al. | 2008
- 457
-
Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access ControlChang, C.-C. / Cheng, Y.-F. / Lin, I.-C. et al. | 2008
- 463
-
Building Trusted Sub-domain for the Grid with Trusted ComputingZhan, J. / Zhang, H. / Yan, F. et al. | 2008
- 472
-
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRMWu, Y. / Bao, F. / Deng, R.H. / Mouffron, M. / Rousseau, F. et al. | 2008
- 482
-
Online Tracing Scanning Worm with Sliding WindowXiang, Y. / Li, Q. et al. | 2008
- 497
-
A New Proactive Defense Model Based on Intrusion Deception and TracebackTian, J. / Li, N. et al. | 2008
- 507
-
On Modeling Post Decryption Error Processes in UMTS Air InterfaceSattar, F. / Mufti, M. et al. | 2008
- 517
-
A Simple, Smart and Extensible Framework for Network Security MeasurementCheng, F. / Wolter, C. / Meinel, C. et al. | 2008