Recursive protocol for group-oriented authentication with key distribution

被引:0
|
作者
Department of Information Management, National Taiwan University of Science and Technology, 43, Section 4, Keelung Road, Taipei, 106, Taiwan [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
J Syst Software | / 7卷 / 1227-1239期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Public key cryptography
引用
收藏
相关论文
共 50 条
  • [41] Group-oriented paper retrieving and filtering
    He, MH
    Luo, XD
    Leung, HF
    Qiu, YH
    INTELLIGENT SYSTEMS, 2000, : 31 - 34
  • [42] Group authentication and group key distribution for Ad hoc networks
    Wang, Feng
    Chang, Chin-Chen
    Chou, Yeh-Chieh
    International Journal of Network Security, 2015, 17 (02) : 199 - 207
  • [43] Protocols for designing a fast and perfect group-oriented secret key sharing in distributed systems
    Tsaur, WJ
    Horng, SJ
    SECOND INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS, AND NETWORKS (I-SPAN '96), PROCEEDINGS, 1996, : 326 - 329
  • [44] Group-oriented mobile services: Requirements and solutions
    Upkar Varshney
    Information Systems and e-Business Management, 2004, 2 (4) : 325 - 335
  • [45] A receiver authentication and group key delivery protocol for secure multicast
    Ueno, H
    Suzuki, H
    Ishikawa, N
    Takahashi, O
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 1139 - 1148
  • [46] A Novel Design of Membership Authentication and Group Key Establishment Protocol
    Harn, Lein
    Hsu, Ching-Fang
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [47] DGKD: Distributed group key distribution with authentication capability
    Adusumilli, P
    Zou, XK
    Ramamurthy, B
    PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 286 - 293
  • [48] GROUP-ORIENTED WORK STRUCTURES ON ASSEMBLY LINES
    BERR, U
    SCHMIDT, V
    WERKSTATTSTECHNIK ZEITSCHRIFT FUR INDUSTRIELLE FERTIGUNG, 1989, 79 (03): : 169 - 172
  • [49] A hierarchical and dynamic group-oriented cryptographic scheme
    Wang, SJ
    Chang, JF
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (01) : 76 - 85
  • [50] Mechanized proofs for a recursive authentication protocol
    Paulson, LC
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 84 - 94