scientific article; zbMATH DE number 708825

From MaRDI portal
Publication:4318716

zbMath0816.94014MaRDI QIDQ4318716

Shay Kutten, Carlo Blundo, Alfredo De Santis, Amir Herzberg, Ugo Vaccaro, Mordechai M. Yung

Publication date: 16 July 1995


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (26)

A novel group key transfer for big data securityTrade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key DistributionOn the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor NetworksOn optimal cryptographic key derivationAn Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured ChannelsAn integer programming formulation of the key management problem in wireless sensor networksConstructions for key distribution patternsA new protocol for the detection of node replication attacks in mobile wireless sensor networksScalable group key exchange protocol with provable securityLinear threshold multisecret sharing schemesUnconditional secure conference key distribution schemes with disenrollment capabilityPolynomial based scheme (PBS) for establishing authentic associations in wireless mesh networksAn optimal multisecret threshold scheme constructionA polynomial-based key distribution approach for wireless sensor networksA deterministic key predistribution method for wireless sensor networks based on hypercube multivariate schemeBroadcast authentication for group communicationUnconditionally-secure key pre-distribution for triangular grid based wireless sensor networkOn \(\tau\)-time secure key agreementThe Rise and Fall and Rise of Combinatorial Key PredistributionGeneration of key predistribution schemes using secret sharing schemesGeneralized Beimel-Chor schemes for broadcast encryption and interactive key distributionA secure and scalable group key exchange systemEfficient Key Predistribution for Grid-Based Wireless Sensor NetworksMultireceiver authentication codes: Models, bounds, constructions, and extensionsCombinatorial Design of Key Distribution Mechanisms for Wireless Sensor NetworksRandomness in distribution protocols




This page was built for publication: