Secure and efficient conference key distribution scheme

被引:0
|
作者
Yuan, Ding
Fan, Ping-Zhi
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] An Efficient Key Distribution Scheme in Cloud Computing
    Tang, Chumming
    Wong, Duncan S.
    Hu, Xing
    Pei, Dingyi
    2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,
  • [42] On the Scalability of an Efficient "Nonscalable" Key Distribution Scheme
    Ramkumar, Mahalingam
    2008 IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, VOLS 1 AND 2, 2008, : 801 - 806
  • [43] Optimal Key Distribution Scheme for Secure Multicast Group Communication
    Zhou, Zhibin
    Huang, Dijiang
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [44] An efficient multiparty quantum key distribution scheme
    Zhang, ZJ
    Man, ZX
    Shi, SH
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2005, 3 (03) : 555 - 560
  • [45] Key distribution scheme based on genetic algorithm in secure multicast
    Xu, Q.
    Zhao, H.
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2001, 22 (03):
  • [46] Analysis and Improvement of Key Distribution Scheme for Secure Group Communication
    Luo, Jia Ning
    Yang, Ming Hour
    JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2016, 2016
  • [47] A key distribution scheme for secure communication in acoustic sensor networks
    Hamid, Md. Abdul
    Abdullah-Al-Wadud, M.
    Hassan, Mohammad Mehedi
    Almogren, Ahmad
    Alamri, Atif
    Kamal, Abu Raihan M.
    Mamun-Or-Rashid, Md.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 : 1209 - 1217
  • [48] Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks
    Mi, Qi
    Stankovic, John A.
    Stoleru, Radu
    WISEC 10: PROCEEDINGS ON THE THIRD ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2010, : 163 - 168
  • [49] An Efficient Conference Key Updating Scheme with the Knowledge of Group Dynamics
    Gu, Xiaozhuo
    Yang, Jianzu
    Ma, Xiangjie
    Lan, Julong
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [50] UNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONS
    Safavi-Naini, Reihaneh
    Jiang, Shaoquan
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (06) : 1369 - 1393