Papers

With Tag: Key Management

Can't find what you are looking for? Add a listing here
Sort By
(0)

Sensor Network Traffic-Adaptive Key Management Scheme

M Venkatesh, S S Patil
2009 | 10.1109/ARTCom.2009.180

none

(0)

The Low-Cost Secure Sessions of Access Control Model for Distributed Applications by Public Personal Smart Cards

Tingwei Hou, Kuoyi Chen, Chinyang Lin
2011 | 10.1109/ICPADS.2011.136

none

(0)

Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings

Xuemin Sherman Shen, Pinhan Ho, Haojin Zhu, Xiaodong Lin, Rongxing Lu
2008 | 10.1109/ICC.2008.296

none

(0)

A taxonomy of customer relationship management analyses for data warehousing

Colleen Cunningham, Ilyeol Song
2007

none

(0)

A Novel Key Management of Two-Tier Dissemination for Wireless Sensor Network

Tzayfarn Shih, Yuting Tsai, Chinling Chen
2012 | 10.1109/IMIS.2012.55

none

(0)

Ceremonies Formal Analysis in PKI's Context

2009 | 10.1109/CSE.2009.324

none

(0)

Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks

Nalini B Menon, Mahalingam Ramkumar
2003 | 10.1109/GLOCOM.2003.1258469

none

(0)

A secure registration protocol for wireless Internet

Lepond Chin
1997 | 10.1109/PIMRC.1997.631054

none

(0)

Key management in the handover. Application to third generation mobile systems

Antonio Barba, J L Melus
1995 | 10.1109/PIMRC.1995.476902

none

(0)

New design strategy of dynamic security implementation

Mohammed Omari, Hamdy S Soliman
2004 | 10.1109/GLOCOMW.2004.1417620

none

(0)

An overview of security in Eurocrypt conditional access system

E Cruselles, J L Melus, Miguel Soriano
1993 | 10.1109/GLOCOM.1993.318121

none

(0)

An Efficient Conference Key Updating Scheme with the Knowledge of Group Dynamics

Jianzu Yang, Julong Lan, Xiaozhuo Gu, Xiangjie Ma
2008 | 10.1109/GLOCOM.2008.ECP.352

none

(0)

Energy efficient MIMO two-way relay system with physical layer network coding

Matti Latvaaho, Nandana Rajatheva, L K Saliya Jayasinghe
2012 | 10.1109/WCNC.2012.6214097

none

(0)

Protecting all traffic channels in mobile IPv6 network

Jianying Zhou, Ying Qiu, Feng Bao
2004 | 10.1109/WCNC.2004.1311536

none

(0)

Cost of Multicast Logical Key Tree Based on Hierarchical Data Processing

Wuhan University Journal of Natural Sciences | 2006

none

(0)

Private Key Management in Hierarchical Identity-Based Encryption

Li Xu, Zhongren Liu, Zhide Chen, Fuchun Guo
2007 | 10.1109/SITIS.2007.18

none

(0)

Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks

M N Lima, Luiz Carlos P Albini, Eduardo Da Silva, Aldri Santos
2008 | 10.1007/978-3-642-05197-5_12

none

Can't find what you are looking for? Add a paper here