Cryptanalysis of an Authenticated Group Key Transfer Protocol Based on Secret Sharing (Englisch)
- Neue Suche nach: Kim, Mijin
- Neue Suche nach: Park, Namje
- Neue Suche nach: Won, Dongho
- Neue Suche nach: Kim, Mijin
- Neue Suche nach: Park, Namje
- Neue Suche nach: Won, Dongho
In:
GPC, International Conference on Grid and Pervasive Computing, 8
;
761-766
;
2013
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Cryptanalysis of an Authenticated Group Key Transfer Protocol Based on Secret Sharing
-
Beteiligte:
-
Erschienen in:Lecture Notes in Computer Science ; 7861 ; 761-766
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:2013
-
Format / Umfang:6 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Transparency in Cloud Business: Cluster Analysis of Software as a Service CharacteristicsRepschlaeger, J. et al. | 2013
- 11
-
Distributed Accounting in Scope of Privacy PreservingHilbrich, M. / Jakel, R. et al. | 2013
- 23
-
Distributed Virtual Machine Monitor for Distributed Cloud Computing Nodes IntegrationRuan, L. / Peng, J. / Xiao, L. / Zhu, M. et al. | 2013
- 32
-
Differentiated Policy Based Job Scheduling with Queue Model and Advanced Reservation Technique in a Private Cloud EnvironmentLoganathan, S. / Mukherjee, S. et al. | 2013
- 40
-
Scaling Out Recommender System for Digital Libraries with MapReduceChen, L.-C. / Kuo, P.-J. / Liao, I.-E. / Huang, J.-Y. et al. | 2013
- 48
-
Layering of the Provenance Data for Cloud ComputingImran, M. / Hlavacs, H. et al. | 2013
- 59
-
JCL: An OpenCL Programming Toolkit for Heterogeneous ComputingLiang, T.-Y. / Lin, Y.-J. et al. | 2013
- 73
-
Network-Aware Multiway Join for MapReduceSlagter, K. / Hsu, C.-H. / Chung, Y.-C. / Park, J.H. et al. | 2013
- 81
-
Automatic Resource Scaling for Web Applications in the CloudLin, C.-C. / Wu, J.-J. / Liu, P. / Lin, J.-A. / Song, L.-C. et al. | 2013
- 91
-
Implementation of Cloud-RAID: A Secure and Reliable Storage above the CloudsSchnjakin, M. / Meinel, C. et al. | 2013
- 103
-
An Improved Min-Min Task Scheduling Algorithm in Grid ComputingAnousha, S. / Ahmadi, M. et al. | 2013
- 114
-
Heterogeneous Diskless Remote Booting System on Cloud Operating SystemWu, J.-N. / Ko, Y.-H. / Huang, K.-M. / Huang, M.-K. et al. | 2013
- 124
-
RTRM: A Response Time-Based Replica Management Strategy for Cloud Storage SystemBai, X. / Jin, H. / Liao, X. / Shi, X. / Shao, Z. et al. | 2013
- 134
-
Secure Hadoop with Encrypted HDFSPark, S. / Lee, Y. et al. | 2013
- 142
-
VM Migration for Fault Tolerance in Spot Instance Based Cloud ComputingJung, D. / Chin, S. / Chung, K.S. / Yu, H. et al. | 2013
- 152
-
A Cloud Based Natural Disaster Management SystemHabiba, M. / Akhter, S. et al. | 2013
- 162
-
A Hybrid Grid/Cloud Distributed Platform: A Case StudyBelgacem, M.B. / Hafsi, H. / Abdennadher, N. et al. | 2013
- 170
-
Comparison of Two Yield Management Strategies for Cloud Service ProvidersKashef, M.M. / Uzbekov, A. / Altmann, J. / Hovestadt, M. et al. | 2013
- 181
-
Comparing Java Virtual Machines for Sensor Nodes - First Glance: Takatuka and DarjeelingMaye, O. / Maaser, M. et al. | 2013
- 189
-
Research on Opinion Formation of Microblog in the View of Multi-agent SimulationZhang, J. / Mi, Q. / Hu, L. / Tang, Y. et al. | 2013
- 199
-
Implementation of Cloud IaaS for Virtualization with Live MigrationYang, C.-T. / Huang, K.-L. / Chu, W.C.-C. / Leu, F.-Y. / Wang, S.-F. et al. | 2013
- 208
-
Security Considerations in Cloud Computing Virtualization EnvironmentYeo, S.-S. / Park, J.H. et al. | 2013
- 216
-
Medicine Rating Prediction and Recommendation in Mobile Social NetworksLi, S. / Hao, F. / Li, M. / Kim, H.-C. et al. | 2013
- 224
-
Cloud Browser: Enhancing the Web Browser with Cloud Sessions and Downloadable User InterfaceTaivalsaari, A. / Mikkonen, T. / Systa, K. et al. | 2013
- 234
-
Visual Novels: An Methodology Guideline for Pervasive Educational Games that Favors DiscernmentSalazar, F.L. / Nakajima, T. / Alexandrova, T. et al. | 2013
- 244
-
An Optimal Radio Access Network Selection Method for Heterogeneous Wireless NetworksCarvalho, G.H.S. / Woungang, I. / Rahman, M.M. / Anpalagan, A. et al. | 2013
- 253
-
Desktop Grid Computing at the Age of the WebAbidi, L. / Cerin, C. / Jemni, M. et al. | 2013
- 262
-
A Novel Model for Greenhouse Control ArchitectureBaek, M. / Lee, M. / Kim, H. / Kim, T. / Bae, N. / Cho, Y. / Park, J. / Shin, C. et al. | 2013
- 270
-
Enhanced Search in Unstructured Peer-to-Peer Overlay NetworksHota, C. / Nunia, V. / Di Francesco, M. / Nurminen, J.K. / Yla-Jaaski, A. et al. | 2013
- 280
-
CE-SeMMS: Cost-Effective and Secure Mobility Management Scheme Based on SIP in NEMO EnvironmentsCho, C. / Choi, J.Y. / Cho, Y. / Jeong, J.P. et al. | 2013
- 288
-
A System-Level Approach for Designing Context-Aware Distributed Pervasive ApplicationsWang, K.I.-K. / Park, H. / Salcic, Z. / Ratnayaka, P. et al. | 2013
- 299
-
Architecture of a Context Aware Framework for Automated Mobile Device ConfigurationOpu, M.F.R. / Biswas, E. / Habiba, M. / Kim, C. et al. | 2013
- 309
-
AMM-PF: Additional Mobility Management Scheme Based on Pointer Forwarding in PMIPv6 NetworksPark, S.Y. / Choi, J.Y. / Jeong, J.P. et al. | 2013
- 317
-
The Evaluation and Optimization of 3-D Jacobi Iteration on a Stream ProcessorZhang, Y. / Li, G. / Li, Y. / Sun, C. / Lu, P. et al. | 2013
- 326
-
DDASTM: Ensuring Conflict Serializability Efficiently in Distributed STMZhang, Y. / Jin, H. / Liao, X. et al. | 2013
- 336
-
Research on Log Pre-processing for Exascale System Using Sparse RepresentationZhu, L. / Gu, J. / Zhao, T. / Wang, Y. et al. | 2013
- 348
-
Using Event-Based Style for Developing M2M ApplicationsLe, T.-G. / Hermant, O. / Manceny, M. / Pawlak, R. / Rioboo, R. et al. | 2013
- 358
-
Scheduling Optimization of the RFID Tagged Explosive Storage Based on Genetic AlgorithmWu, X. / Fu, H. / He, X. / Liu, G. / Li, J. / Chen, H. / Wang, Q. / He, Q. et al. | 2013
- 367
-
Weighted Mining Association Rules Based Quantity Item with RFM Score for Personalized u-Commerce Recommendation SystemCho, Y.S. / Noh, S.C. / Moon, S.C. et al. | 2013
- 376
-
Priority-Based Live Migration of Virtual MachineJiang, B. / Wu, J. / Zhu, X. / Hu, D. et al. | 2013
- 386
-
Improvement of the MCMA Blind Equalization Performance Using the Coordinate Change Method in 16-APSKKim, Y. / Ryu, H.-G. et al. | 2013
- 393
-
Postural Transition Detection Using a Wireless Sensor Activity Monitoring SystemLeMay, R. / Choi, S. / Youn, J.-H. / Newstorm, J. et al. | 2013
- 403
-
A Dedicated Serialization Scheme in Homogeneous Cluster RPC CommunicationWan, Y. / Feng, D. / Wang, F. / Zhu, T. et al. | 2013
- 413
-
Friends Based Keyword Search over Online Social NetworksHuang, J. / Jin, H. et al. | 2013
- 423
-
GPU Virtualization Support in Cloud SystemYeh, C.-Y. / Kao, C.-Y. / Hung, W.-S. / Lin, C.-C. / Liu, P. / Wu, J.-J. / Liu, K.-C. et al. | 2013
- 433
-
MGMR: Multi-GPU Based MapReduceChen, Y. / Qiao, Z. / Jiang, H. / Li, K.-C. / Ro, W.W. et al. | 2013
- 443
-
DDoS Analysis Using Correlation Coefficient Based on Kolmogorov ComplexityKim, S.-j. / Kim, B.C. / Lee, J.Y. et al. | 2013
- 453
-
An Efficient Attribute-Based Encryption and Access Control Scheme for Cloud Storage EnvironmentHuang, J.-Y. / Chiang, C.-K. / Liao, I.-E. et al. | 2013
- 464
-
Active One-Time Password Mechanism for User AuthenticationFan, C.-I. / Wu, C.-N. / Weng, C.-Y. / Lin, C.-Y. et al. | 2013
- 472
-
Hardware Acceleration for Cryptography Algorithms by Hotspot DetectionChang, J.K.-T. / Liu, C. / Gaudiot, J.-L. et al. | 2013
- 482
-
Chaotic Wireless Communication System Using Retrodirective Array Antenna for Advanced High SecurityBok, J. / Ryu, H.-G. et al. | 2013
- 491
-
Policy-Based Customized Privacy Preserving Mechanism for SaaS ApplicationsShi, Y. / Jiang, Z. / Zhang, K. et al. | 2013
- 501
-
QoC-Aware Access Control Based on Fuzzy Inference for Pervasive Computing EnvironmentsMa, Y. / Lu, H. / Gan, Z. et al. | 2013
- 509
-
Per-File Secure Deletion Combining with Enhanced Reliability for SSDsQin, Y. / Feng, D. / Tong, W. / Liu, J. / Hu, Y. / Zhu, Z. et al. | 2013
- 517
-
An Energy-Aware Secured Routing Protocol for Mobile Ad Hoc Networks Using Trust-Based MultipathWoungang, I. / Dhurandher, S.K. / Sahai, M. et al. | 2013
- 526
-
A Grid-Based Approximate K-NN Query Processing Algorithm for Privacy Protection in Location-Based ServicesJang, M. / Chang, J.-W. et al. | 2013
- 536
-
Density-Based K-Anonymization Scheme for Preserving Users' Privacy in Location-Based ServicesLee, H. / Chang, J.-W. et al. | 2013
- 546
-
A Routing Mechanism Using Virtual Coordination Anchor Node Apply to Wireless Sensor NetworksTsai, C.-H. / Chang, K.-T. / Wang, Y.-H. et al. | 2013
- 556
-
Effect of Genetic Parameters in Tour Scheduling and Recommender Services for Electric VehiclesLee, J. / Park, G.-L. / Kim, H.-J. / Lee, B.-J. / Lee, S. / Im, D.-Y. et al. | 2013
- 563
-
Enabling Massive Machine-to-Machine Communications in LTE-AdvancedJun, K. et al. | 2013
- 570
-
Enhancements for Local Repair in AODV-Based Ad-Hoc NetworksShin, H.-H. / Lee, S. / Kim, B.-S. et al. | 2013
- 577
-
Smart Watch and Monitoring System for Dementia PatientsShin, D.-M. / Shin, D. et al. | 2013
- 585
-
A Lesson from the Development of Surveillance and Reconnaissance Sensor Networks SystemsKim, D. / Lee, S. / Ahn, M. et al. | 2013
- 594
-
A Classifier Algorithm Exploiting User's Environmental Context and Bio-signal for U-Home ServicesLee, H. / Shin, D. / Kim, S. et al. | 2013
- 602
-
DNA-S: Dynamic Cellular Network Architecture for Smart CommunicationsLee, T. / Chung, G.-S. et al. | 2013
- 612
-
Predicting of Abnormal Behavior Using Hierarchical Markov Model Based on User Profile in Ubiquitous EnvironmentShin, J. / Shin, D. et al. | 2013
- 623
-
Advanced Facial Skin Rendering with Actual Fresnel Refractive Index Reflecting Facial Tissue FeaturesLee, S. / Chin, S. et al. | 2013
- 631
-
Emotion Recognition Technique Using Complex Biomedical Signal AnalysisHwang, G. / Cho, H. / Shin, D. et al. | 2013
- 641
-
RWA: Reduced Whole Ack Mechanism for Underwater Acoustic Sensor NetworkShin, S.Y. / Park, S.H. et al. | 2013
- 649
-
Data Hiding Based on Palette Images Using Weak Bases of Z~2-ModulesHuy, P.T. / Kim, C. / Anh, N.T. / Hoa, L.Q. / Yang, C.-N. et al. | 2013
- 659
-
Adaptive Smart Vehicle Middleware Platform for Aspect Oriented Software EngineeringKim, J.-H. / Kim, S.-C. et al. | 2013
- 665
-
Parallel Generation of Optimal Mortgage Refinancing Threshold RatesZhang, N. / Xie, D. / Lim, E.G. / Wan, K. / Man, K.L. et al. | 2013
- 676
-
Pricing American Options on Dividend-Paying Stocks and Estimating the Greek Letters Using Leisen-Reimer Binomial TreesZhang, N. / Wan, K. / Lim, E.G. / Man, K.L. et al. | 2013
- 686
-
A Resource-Centric Architecture for Service-Oriented Cyber Physical SystemWan, K. / Alagar, V. et al. | 2013
- 694
-
Implied Volatilities of S&P 100 Index with Applications to Financial MarketZheng, J. / Zhang, N. / Xie, D. et al. | 2013
- 700
-
RF Characteristics of Wireless Capsule Endoscopy in Human BodyZhang, M. / Lim, E.G. / Wang, Z. / Tillo, T. / Man, K.L. / Wang, J.C. et al. | 2013
- 707
-
Building a Laboratory Surveillance System via a Wireless Sensor NetworkLei, C.-U. / Seon, J.K. / Shen, Z. / Man, K.L. / Hughes, D. / Kim, Y. et al. | 2013
- 715
-
S-Theory: A Unified Theory of Multi-paradigm Software DevelopmentHughes, D. / Bencomo, N. / Morin, B. / Huygens, C. / Shen, Z. / Man, K.L. et al. | 2013
- 723
-
Design of J-VTS Middleware Based on IVEF ProtocolKang, T. / Park, N. et al. | 2013
- 730
-
On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange ProtocolLee, Y. / Won, D. et al. | 2013
- 737
-
A Sequence Classification Model Based on Pattern Coverage RateLi, I.-H. / Huang, J.-Y. / Liao, I.-E. / Lin, J.-H. et al. | 2013
- 746
-
Development of STEAM Program and Teaching Method for Using LEGO Line Tracer Robot in Elementary SchoolKo, Y. / Park, N. et al. | 2013
- 752
-
Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility NetworksChung, Y. / Lee, Y. / Won, D. et al. | 2013
- 761
-
Cryptanalysis of an Authenticated Group Key Transfer Protocol Based on Secret SharingKim, M. / Park, N. / Won, D. et al. | 2013
- 767
-
Development of the STEAM-Based Media Education Materials for Prevention of Media Dysfunction in Elementary SchoolAn, J. / Park, N. et al. | 2013
- 773
-
Access Control Technique of Illegal Harmful Contents for Elementary Schoolchild Online ProtectionPark, N. / Ko, Y. et al. | 2013
- 781
-
The Concept of Delegation of Authorization and Its Expansion for Multi Domain Smart Grid SystemKim, M. / Park, N. et al. | 2013
- 788
-
Security Requirement of End Point Security SoftwareLee, H.-J. / Lee, Y. / Won, D. et al. | 2013
- 796
-
Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap SystemJeun, I. / Lee, Y. / Won, D. et al. | 2013
- 803
-
Improvement of a Chaotic Map Based Key Agreement Protocol That Preserves AnonymityYang, H. / Qiuyan, J. / Lee, H. / Lee, K. / Won, D. et al. | 2013
- 811
-
Solving Router Nodes Placement Problem with Priority Service Constraint in WMNs Using Simulated AnnealingLin, C.-C. / Lin, Y.-L. / Liu, W.-Y. et al. | 2013
- 819
-
Topology Information Based Spare Capacity Provisioning in WDM NetworksHwang, H. / Kim, S.-C. et al. | 2013
- 826
-
A Contents Service Profit Model Based on the Quality of Experience and User Group CharacteristicsLee, G.Y. / Kim, H.J. / Jeong, C.K. / Lee, Y. et al. | 2013
- 832
-
Toward Hybrid Model for Architecture-Oriented Semantic Schema of Self-adaptive SystemKim, J.-H. / Kim, S.-C. et al. | 2013
- 838
-
Optimal Channel Sensing in Cognitive Radio Network with Multiple Secondary UsersYu, H. et al. | 2013
- 846
-
H.264 Video Delivery over Wireless Mesh Networks Based on Joint Adaptive Cross-Layer Mapping and MDCA MACOh, B.J. / Lee, K.Y. et al. | 2013
- 854
-
Automatic Tracking Angle of Arrival of Bandpass Sampling OFDM Signal by MUSIC AlgorithmWang, X. / Ryu, H.-G. et al. | 2013
- 860
-
A White-List Based Security Architecture (WLSA) for the Safe Mobile Office in the BYOD EraLee, J. / Lee, Y. / Kim, S.-C. et al. | 2013
- 866
-
A Study of Vessel Deviation Prevention Scheme Using a Triangulation in a SeawayChen, S. / Ahmad, R. / Lee, B.-G. / Kim, B.-D. / Kim, D.-H. et al. | 2013
- 873
-
Analysis of Energy Consumption in Edge Router with Sleep Mode for Green OBS NetworksYang, W. / Ahmed, M.A. / Lee, K.-B. / Kim, Y.-C. et al. | 2013
- 880
-
VLC Based Multi-hop Audio Data Transmission SystemDung, L.T. / Jo, S. / An, B. et al. | 2013
- 886
-
A Practical Adaptive Scheme for Enhancing Network Stability in Mobile Ad-Hoc Wireless NetworksDung, L.T. / Ha, S.H. / An, B. et al. | 2013
- 893
-
A Geomulticast Routing Protocol Based on Route Stability in Mobile Ad-Hoc Wireless NetworksHa, S.H. / Dung, L.T. / An, B. et al. | 2013
- 899
-
RFID-Based Indoor Location Recognition System for Emergency Rescue Evacuation SupportDo, D.-M. / Hyun, M.-H. / Choi, Y.-B. et al. | 2013
- 907
-
A Symmetric Hierarchical Clustering Related to the Sink Position and Power Threshold for Sensor NetworksKook, J. et al. | 2013
- 914
-
A Study of Fire Refuge Guide Simulator Based on Sensor NetworksBoo, J.-P. / Kim, S.-C. / Park, D.-H. / Bang, H.-C. / Kim, D.-H. et al. | 2013
- 920
-
Design of Parallel Pipelined Algorithm for Field Arithmetic Architecture Based on Cellular ArrayKim, K.-W. / Jeon, J.-C. et al. | 2013
- 926
-
Follower Classification Through Social Network Analysis in TwitterSeol, J.-W. / Jeong, K.-Y. / Lee, K.-S. et al. | 2013
- 932
-
An Initial Quantization Parameter Decision Method Based on Frame Complexity with Multiple Objectives of GOP for Rate Control of H.264Wu, Y. / Ko, S.-W. et al. | 2013
- 939
-
The Development of Privacy Telephone Sets in Encryption System against EavesdroppingLee, S.-P. / Nahm, E.-s. et al. | 2013
- 945
-
New ID-Based Proxy Signature Scheme with Message RecoveryYoon, E.-J. / Choi, Y. / Kim, C. et al. | 2013