|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 105 occurrences of 58 keywords
|
|
|
Results
Found 145 publication records. Showing 145 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
48 | Valery I. Korzhik, Viktor Yakovlev, Alexander Sinuk |
Achievability of the Key-Capacity in a Scenario of Key Sharing. |
MMM-ACNS |
2003 |
DBLP DOI BibTeX RDF |
Wire-tap channel, public discussion, key capacity, privacy amplification, Renyi entropy |
47 | Tsutomu Matsumoto |
Incidence Structures for Key Sharing (Extended Abstract). |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
Key Sharing, Tactical Configuration, Tamper Resistant Module, Cryptography, Key Distribution, Identifier, Combinatorial Design, Binary Matrix |
42 | Woei-Jiunn Tsaur, Shi-Jinn Horng |
Protocols for Designing a Fast and Perfect Group-Oriented Secret Key Sharing in Distributed Systems. |
ISPAN |
1996 |
DBLP DOI BibTeX RDF |
Secret Key Sharing Scheme, Distributed Systems, Cryptography, Information Security, Group-Oriented Cryptography |
41 | Taejoon Park, Kang G. Shin |
Secure routing based on distributed key sharing in large-scale sensor networks. |
ACM Trans. Embed. Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Distributed key sharing and servers, attack tolerance, large-scale sensor networks, secure geographic forwarding, key establishment |
32 | Yixin Jiang, Chuang Lin 0002, Minghui Shi, Xuemin Shen |
Multiple Key Sharing and Distribution Scheme With (n, t) Threshold for NEMO Group Communications. |
IEEE J. Sel. Areas Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Tsuyoshi Nishioka, Goichiro Hanaoka, Hideki Imai |
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. |
ISW |
1999 |
DBLP DOI BibTeX RDF |
|
29 | Laurent Eschenauer, Virgil D. Gligor |
A key-management scheme for distributed sensor networks. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
sensor networks, key management, random graphs, probabilistic key sharing |
24 | Valeri Korjik, Guillermo Morales-Luna, Vladimir B. Balakirsky |
Privacy Amplification Theorem for Noisy Main Channel. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
Key-sharing, Rènyi information, error correcting codes, hashing, privacy amplification |
22 | Nguyen Thi Thanh Huyen, Eui-nam Huh |
An efficient signal range based key pre-distribution scheme ensuring the high connectivity in wireless sensor network. |
ICUIMC |
2008 |
DBLP DOI BibTeX RDF |
security, wireless sensor network, key management, key pre-distribution |
22 | Shogo Ochiai, Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal |
Secure Pairwise Key Sharing using Geometric Group Key Sharing Method. |
CCNC |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Shogo Ochiai, Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal |
Secure Pairwise Key Sharing using Geometric Group Key Sharing Method (Full Paper). |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
20 | Shigeo Tsujii, Jinhui Chao |
A New ID-Based Key Sharing System. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
17 | Jian Wang 0038, Zhengyou Xia, Lein Harn, Guihai Chen |
Storage-Optimal Key Sharing with Authentication in Sensor Networks. |
ISPA Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng |
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Fang Liu 0025, Xiuzhen Cheng 0001, Liran Ma, Kai Xing |
SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks. |
IEEE Trans. Mob. Comput. |
2008 |
DBLP DOI BibTeX RDF |
Security, Network-level security and protection, integrity and protection |
16 | Fang Liu 0025, Jose Manny Rivera, Xiuzhen Cheng 0001 |
Location-aware key establishment in wireless sensor networks. |
IWCMC |
2006 |
DBLP DOI BibTeX RDF |
in-situ key establishment, security, wireless sensor networks |
16 | Shweta Arora, Muzzammil Hussain |
Secure Session Key Sharing Using Symmetric Key Cryptography. |
ICACCI |
2018 |
DBLP DOI BibTeX RDF |
|
16 | Anjali Gupta, Muzzammil Hussain |
Secure Session Key Sharing Using Public Key Cryptography. |
WCI |
2015 |
DBLP DOI BibTeX RDF |
|
16 | Matheos Kazantzidis |
Extending key sharing: how to generate a key tightly coupled to a network security policy. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Shinichi Goto, Keiichi Iwamura, Yuji Suga, Kitahiro Kaneda |
Secret Sharing Scheme and Key Sharing Scheme Suitable for Clustered Sensor Networks. |
WINSYS |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Ali Fanian, Mehdi Berenjkoub, Hossein Saidi 0001, T. Aaron Gulliver |
A New Key Establishment Protocol for Limited Resource Wireless Sensor Networks. |
CNSR |
2010 |
DBLP DOI BibTeX RDF |
Sensor networks, Key management, Probabilistic key sharing, Symmetric polynomials |
15 | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan |
Redoubtable Sensor Networks. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
Wireless sensor network, connectivity, random graphs, probabilistic key sharing |
15 | Takashi Ito, Hidenori Ohta, Nori Matsuda, Takeshi Yoneda |
A key pre-distribution scheme for secure sensor networks using probability density function of node deployment. |
SASN |
2005 |
DBLP DOI BibTeX RDF |
sensor networks, key management, probabilistic key sharing |
15 | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan |
Connectivity properties of secure wireless sensor networks. |
SASN |
2004 |
DBLP DOI BibTeX RDF |
sensor networks, connectivity, key management, random graphs, probabilistic key sharing |
15 | Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein Harn |
Location-aware key management scheme for wireless sensor networks. |
SASN |
2004 |
DBLP DOI BibTeX RDF |
sensor networks, key management, probabilistic key sharing |
15 | Valery I. Korzhik, Guillermo Morales-Luna |
Hybrid authentication based on noisy channels. |
Int. J. Inf. Sec. |
2003 |
DBLP DOI BibTeX RDF |
Key sharing, Information-theoretically secure authentication, Hash functions, Privacy amplification |
15 | Donggang Liu, Peng Ning |
Establishing pairwise keys in distributed sensor networks. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
sensor networks, key management, probabilistic key sharing |
15 | Donggang Liu, Peng Ning |
Location-based pairwise key establishments for static sensor networks. |
SASN |
2003 |
DBLP DOI BibTeX RDF |
sensor networks, key management, probabilistic key sharing |
15 | Chih-Hung Wang, Tzonelih Hwang |
Threshold and Generalized DSS Signatures without a Trusted Party. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
(t+1,n) threshold signature scheme, generalized DSS signatures, trusted party, secret key sharing, valid group signature, Digital Signature Standard, signers, conspiracy, signing procedure, cryptography |
15 | Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia |
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. |
ICNP |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Viktor Yakovlev, Valery Korjik, Alexander Sinuk |
Key Distribution Protocol Based on Noisy Channel and Error Detecting Codes. |
MMM-ACNS |
2001 |
DBLP DOI BibTeX RDF |
|
13 | Kim-Kwang Raymond Choo, Yvonne Hitchcock |
Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Hao Yang 0004, Songwu Lu |
Commutative cipher based en-route filtering in wireless sensor networks. |
VTC Fall (2) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Ping Li, Jiaying Wu, Jingming Xue |
Research on Pairwise Key Establishment for Cluster Heads in Sensor Networks. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Chuangui Ma, Rui Cheng |
Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
hierarchical secret sharing, ad-hoc network, key management, verifiable secret sharing |
12 | Dan Boneh, Ramarathnam Venkatesan |
Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
12 | Ping Li 0034, Yaping Lin, Jiaying Wu, Jingming Xue |
Analysis on Node's Pairwise Key Path Construction in Sensor Networks. |
HPCC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Guyue Li, Hongyi Luo, Jiabao Yu, Aiqun Hu, Jiangzhou Wang |
Information-Theoretic Secure Key Sharing for Wide-Area Mobile Applications. |
IEEE Wirel. Commun. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Zhenyu Wang, Ding Deng, Shen Hou, Yang Guo 0003, Shaoqing Li |
Design of three-factor secure and efficient authentication and key-sharing protocol for IoT devices. |
Comput. Commun. |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Guyue Li, Hongyi Luo, Jiabao Yu, Aiqun Hu, Jiangzhou Wang |
Information-Theoretic Secure Key Sharing for Wide-Area Mobile Applications. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Mario Mastriani |
Non-distributable key-sharing protocol with particular emphasis on the Internet of Things. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
11 | Mahabub Hasan Mahalat, Dipankar Karmakar, Anindan Mondal, Bibhash Sen |
PUF based Secure and Lightweight Authentication and Key-Sharing Scheme for Wireless Sensor Network. |
ACM J. Emerg. Technol. Comput. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Prasanna Ravi, James Howe, Anupam Chattopadhyay, Shivam Bhasin |
Lattice-based Key-sharing Schemes: A Survey. |
ACM Comput. Surv. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | C. Madan Kumar, Ruhul Amin 0001, M. Brindha 0001 |
SafeCom: Robust mutual authentication and session key sharing protocol for underwater wireless sensor networks. |
J. Syst. Archit. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Taku Noguchi, Masato Nakagawa, Masami Yoshida, Alberto Gallegos Ramonet |
A Secure Secret Key-Sharing System for Resource-Constrained IoT Devices using MQTT. |
ICACT |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Zhenyu Wang, Ding Deng, Yang Guo 0003, Shaoqing Li |
HCRO-LKSM: A Lightweight Key Sharing and Management Protocol Based on HCRO-PUF for IoT Devices. |
HPCC/DSS/SmartCity/DependSys |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Viktor Yakovlev, Valery I. Korzhik, Milena Akhmetshina, Aleksey Zhuvikin |
Key Sharing Protocol Using Exchange by Integers over Public Noiseless Channels Between Users that Provides Security without Cryptographic Assumptions. |
FRUCT |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Viktor Yakovlev, Valery I. Korzhik, Vladimir Starostin, Alexey Lapshin, Aleksey Zhuvikin |
Channel Traffic Minimizing Key Sharing Protocol Intended for the Use over the Internet and Secure without any Cryptographic Assumptions. |
FRUCT |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Yanji Piao, Zhijun Quan, Xinghui Piao |
An Encryption Key Sharing Method for Contact Tracing Application. |
APWeb/WAIM Workshops |
2022 |
DBLP DOI BibTeX RDF |
|
11 | KyungHyun Han, Ali Raza 0005, Seong Oun Hwang |
CAPTCHA-Based Secret-Key Sharing Using Quantum Communication. |
IT Prof. |
2021 |
DBLP DOI BibTeX RDF |
|
11 | Guojia Li, Lin You |
A Consortium Blockchain Wallet Scheme Based on Dual-Threshold Key Sharing. |
Symmetry |
2021 |
DBLP DOI BibTeX RDF |
|
11 | Shayan Mohajer Hamidi, Amir Keyvan Khandani, Ehsan Bateni |
A Secure Key Sharing Algorithm Exploiting Phase Reciprocity in Wireless Channels. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
11 | Fuyuan Song, Zheng Qin 0001, Jinwen Liang, Xiaodong Lin 0001 |
An Efficient and Privacy-Preserving Multi-User Multi-Keyword Search Scheme without Key Sharing. |
ICC |
2021 |
DBLP DOI BibTeX RDF |
|
11 | Valery I. Korzhik, Vladimir Starostin, Muaed Kabardov, Viktor Yakovlev, Aleksandr Gerasimovich, Aleksey Zhuvikin |
Optimization of the Key Sharing Protocol for Noiseless Public Channels without the Use of Cryptographic Assumptions. |
MIPRO |
2021 |
DBLP DOI BibTeX RDF |
|
11 | Jiliang Zhang 0002, Gang Qu 0001 |
Physical Unclonable Function-Based Key Sharing via Machine Learning for IoT Security. |
IEEE Trans. Ind. Electron. |
2020 |
DBLP DOI BibTeX RDF |
|
11 | Hideo Nishimura, Yoshihiko Omori, Takao Yamashita |
Secure Authentication Key Sharing between Personal Mobile Devices Based on Owner Identity. |
J. Inf. Process. |
2020 |
DBLP DOI BibTeX RDF |
|
11 | Ch. Srikanth |
Certain sequence of arithmetic progressions and a new key sharing method. |
Cryptogr. Commun. |
2020 |
DBLP DOI BibTeX RDF |
|
11 | Prasanna Ravi, James Howe, Anupam Chattopadhyay, Shivam Bhasin |
Lattice-based Key Sharing Schemes - A Survey. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
11 | Wei Tang, Yu-Ling Chen, Yun Yang |
A Block Chain Dynamic Key Sharing and Updating Scheme Based on the (t, n) Threshold. |
ML4CS (1) |
2020 |
DBLP DOI BibTeX RDF |
|
11 | Zhou Yang, Jueyu Chen |
A Smart Meter-Reading Framework With Secret Key Sharing and Support Vector Machine Algorithms. |
DSA |
2020 |
DBLP DOI BibTeX RDF |
|
11 | Peng Zhang, Juntao Gao, Wenjuan Jia, Xuelian Li |
Design of compressed sensing fault-tolerant encryption scheme for key sharing in IoT Multi-cloudy environment(s). |
J. Inf. Secur. Appl. |
2019 |
DBLP DOI BibTeX RDF |
|
11 | Liang Wang 0014, Baocang Wang, Wei Song, Zhili Zhang |
A key-sharing based secure deduplication scheme in cloud storage. |
Inf. Sci. |
2019 |
DBLP DOI BibTeX RDF |
|
11 | Bogdan Groza, Lucian Popa 0003, Pal-Stefan Murvay |
TRICKS - Time TRIggered Covert Key Sharing for Controller Area Networks. |
IEEE Access |
2019 |
DBLP DOI BibTeX RDF |
|
11 | Jiaojiao Zhao, Wenping Ma 0002, Wei Luo 0003, Xiaoxue Liu |
基于密钥共享的分层混合认证模型 (Hierarchical Hybrid Authentication Model Based on Key Sharing). |
计算机科学 |
2019 |
DBLP DOI BibTeX RDF |
|
11 | Jayanth Shenoy, Aditya Tyagi, Meha Halabe, Christine Julien 0001 |
Jive: spatially-constrained encryption key sharing using visible light communication. |
MobiQuitous |
2019 |
DBLP DOI BibTeX RDF |
|
11 | Guillermo Morales-Luna, Valery I. Korzhik, Vladimir Starostin, Muaed Kabardov, Aleksandr Gerasimovich, Victor Yakovlev, Aleksey Zhuvikin |
Information theoretical secure key sharing protocol for noiseless public constant parameter channels without cryptographic assumptions. |
FedCSIS |
2019 |
DBLP DOI BibTeX RDF |
|
11 | Koki Nishigami, Keiichi Iwamura |
Efficient Geometric Group Key-sharing Scheme. |
ICETE (1) |
2019 |
DBLP DOI BibTeX RDF |
|
11 | Abdeldime Mohamed Salih Abdelgader, Shu Feng, Lenan Wu |
Exploiting the Randomness Inherent of the Channel for Secret Key Sharing in Vehicular Communications. |
Int. J. Intell. Transp. Syst. Res. |
2018 |
DBLP DOI BibTeX RDF |
|
11 | Jiliang Zhang 0002 |
Crossover RO PUF-based Key Sharing for IoT Security. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
11 | Guillermo Morales-Luna, Valery I. Korzhik, Aleksandr Gerasimovich, Cuong Nguyen 0005, Vladimir Starostin, Victor Yakovlev, Muaed Kabardov |
Secret Key Sharing Protocol between Units Connected by Wireless MIMO Fading Channels. |
FedCSIS |
2018 |
DBLP DOI BibTeX RDF |
|
11 | Koki Nishigami, Keiichi Iwamura |
Geometric Pairwise Key-Sharing Scheme. |
SecITC |
2018 |
DBLP DOI BibTeX RDF |
|
11 | Zhuo Wei, Yanjiang Yang, Yongdong Wu, Jian Weng 0001, Robert H. Deng |
HIBS-KSharing: Hierarchical Identity-Based Signature Key Sharing for Automotive. |
IEEE Access |
2017 |
DBLP DOI BibTeX RDF |
|
11 | Michael Bierma, Aaron Brown, Troy DeLano, Thomas M. Kroeger, Howard Poston |
Locally Operated Cooperative Key Sharing (LOCKS). |
ICNC |
2017 |
DBLP DOI BibTeX RDF |
|
11 | Jun Hamasaki, Keiichi Iwamura |
Geometric group key-sharing scheme using euclidean distance. |
CCNC |
2017 |
DBLP DOI BibTeX RDF |
|
11 | Daniele Pinchera, Marco Donald Migliore |
Effectively Exploiting Parasitic Arrays for Secret Key Sharing. |
IEEE Trans. Veh. Technol. |
2016 |
DBLP DOI BibTeX RDF |
|
11 | Lin You, Yuna Wang, Yulei Chen, Qi Deng, Huanhuan Zhang |
A Novel Key Sharing Fuzzy Vault Scheme. |
KSII Trans. Internet Inf. Syst. |
2016 |
DBLP DOI BibTeX RDF |
|
11 | Vinothkumar Muthurajan, Balaji Narayanasamy |
DKSM-DHT: privacy-preserving dynamic key sharing model in distributed cloud computing environment. |
Secur. Commun. Networks |
2016 |
DBLP DOI BibTeX RDF |
|
11 | Abdalah Hilmia, Kasun Hewage, Ambuj Varshney, Christian Rohner, Thiemo Voigt |
Poster Abstract: BouKey: Location-Based Key Sharing Using Visible Light Communication. |
IPSN |
2016 |
DBLP DOI BibTeX RDF |
|
11 | Frank Cangialosi, Taejoong Chung, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson |
Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem. |
CCS |
2016 |
DBLP DOI BibTeX RDF |
|
11 | Shaohui Wang, Tian Liu, Fu Xiao 0001, Ruchuan Wang 0001 |
Privacy-preserving k-NN computation over encrypted cloud data without key sharing. |
CCIS |
2016 |
DBLP DOI BibTeX RDF |
|
11 | Lavinia Mihaela Dinca, Gerhard P. Hancke 0002 |
A framework for user-centric key sharing in personal sensor networks. |
INDIN |
2016 |
DBLP DOI BibTeX RDF |
|
11 | Jun Hamasaki, Ryo Kaneko, Keiichi Iwamura |
Geometric group key-sharing scheme. |
GCCE |
2016 |
DBLP DOI BibTeX RDF |
|
11 | Daniele Pinchera, Marco Donald Migliore |
Secret key sharing by means of reconfigurable antenna systems. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
11 | Qinqin Wang, Yanqin Zhu, Xizhao Luo |
Multi-user Searchable Encryption with Coarser-Grained Access Control without Key Sharing. |
CCBD |
2014 |
DBLP DOI BibTeX RDF |
|
11 | Wiroon Sriborrirux, Panuwat Promsiri, Apirath Limmanee |
Multiple Secret Key Sharing Based on the Network Coding Technique for an Open Cloud DRM Service Provider. |
CSE |
2014 |
DBLP DOI BibTeX RDF |
|
11 | Yanan Liu, Jian Wang 0038, He Du, Li-jun Sha |
Intra-cluster key sharing in hierarchical sensor networks. |
IET Wirel. Sens. Syst. |
2013 |
DBLP DOI BibTeX RDF |
|
11 | Youwen Zhu, Rui Xu 0006, Tsuyoshi Takagi |
Secure k-NN query on encrypted cloud database without key-sharing. |
Int. J. Electron. Secur. Digit. Forensics |
2013 |
DBLP DOI BibTeX RDF |
|
11 | Qian Sun, Min Wu |
A Double Key-sharing Based False Data Filtering Scheme in Wireless Sensor Networks. |
J. Comput. |
2013 |
DBLP BibTeX RDF |
|
11 | Piotr K. Tysowski, M. Anwarul Hasan |
Cloud-hosted key sharing towards secure and scalable mobile applications in clouds. |
ICNC |
2013 |
DBLP DOI BibTeX RDF |
|
11 | Ahmed Elbagoury, Ahmed Mohsen, Mohamed Ramadan, Moustafa Youssef 0001 |
Practical provably secure key sharing for near field communication devices. |
ICNC |
2013 |
DBLP DOI BibTeX RDF |
|
11 | Martin Strohmeier, Ivan Martinovic, Utz Roedig, Karim El Defrawy, Jens B. Schmitt |
Neighborhood watch: On network coding throughput and key sharing. |
GLOBECOM |
2013 |
DBLP DOI BibTeX RDF |
|
11 | Yoshihiro Indo, Takaaki Mizuki, Takao Nishizeki |
Absolutely Secure Message Transmission using a Key Sharing Graph. |
Discret. Math. Algorithms Appl. |
2012 |
DBLP DOI BibTeX RDF |
|
11 | Keith B. Frikken |
Cryptographic Enforcement of Access Control while Mitigating Key Sharing. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
11 | Lin You, Mengsheng Fan, Jie Lu, Shengguo Wang, Fenghai Li |
A Key Sharing Fuzzy Vault Scheme. |
ICICS |
2012 |
DBLP DOI BibTeX RDF |
|
11 | Donggang Liu |
Probabilistic Key Sharing. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
11 | Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref |
Rate regions of secret key sharing in a new source model. |
IET Commun. |
2011 |
DBLP DOI BibTeX RDF |
|
11 | Qian Sun, Min Wu |
A Double Key-Sharing Based False Data Filtering Scheme in Wireless Sensor Networks. |
TrustCom |
2011 |
DBLP DOI BibTeX RDF |
|
11 | Yasuyuki Murakami, Masao Kasahara |
An ID-based key sharing scheme based on discrete logarithm problem over a product of three primes. |
JSIAM Lett. |
2010 |
DBLP DOI BibTeX RDF |
|
11 | Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref |
Rate Regions of Secret Key Sharing in a New Source Model |
CoRR |
2010 |
DBLP BibTeX RDF |
|
11 | Yanan Liu, Jian Wang 0038, He Du, Liang Zhang |
Key Sharing in Hierarchical Wireless Sensor Networks. |
EUC |
2010 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 145 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|