scientific article; zbMATH DE number 708825
From MaRDI portal
Publication:4318716
zbMath0816.94014MaRDI QIDQ4318716
Shay Kutten, Carlo Blundo, Alfredo De Santis, Amir Herzberg, Ugo Vaccaro, Mordechai M. Yung
Publication date: 16 July 1995
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (26)
A novel group key transfer for big data security ⋮ Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution ⋮ On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks ⋮ On optimal cryptographic key derivation ⋮ An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels ⋮ An integer programming formulation of the key management problem in wireless sensor networks ⋮ Constructions for key distribution patterns ⋮ A new protocol for the detection of node replication attacks in mobile wireless sensor networks ⋮ Scalable group key exchange protocol with provable security ⋮ Linear threshold multisecret sharing schemes ⋮ Unconditional secure conference key distribution schemes with disenrollment capability ⋮ Polynomial based scheme (PBS) for establishing authentic associations in wireless mesh networks ⋮ An optimal multisecret threshold scheme construction ⋮ A polynomial-based key distribution approach for wireless sensor networks ⋮ A deterministic key predistribution method for wireless sensor networks based on hypercube multivariate scheme ⋮ Broadcast authentication for group communication ⋮ Unconditionally-secure key pre-distribution for triangular grid based wireless sensor network ⋮ On \(\tau\)-time secure key agreement ⋮ The Rise and Fall and Rise of Combinatorial Key Predistribution ⋮ Generation of key predistribution schemes using secret sharing schemes ⋮ Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution ⋮ A secure and scalable group key exchange system ⋮ Efficient Key Predistribution for Grid-Based Wireless Sensor Networks ⋮ Multireceiver authentication codes: Models, bounds, constructions, and extensions ⋮ Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks ⋮ Randomness in distribution protocols
This page was built for publication: