Extension of CHW cryptographic key assignment scheme in a hierarchy

被引:13
|
作者
Hwang, MS [1 ]
机构
[1] Chaoyang Univ Technol, Dept Informat Management, Taichung, Taiwan
来源
关键词
D O I
10.1049/ip-cdt:19990552
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An extension of the CHW cryptographic key assignment scheme in a hierarchy can defend against attacks using Tan, Gu and Zhus' methods.
引用
收藏
页码:219 / 219
页数:1
相关论文
共 50 条
  • [41] A Model of Hierarchical Key Assignment Scheme
    ZHANG Zhigang~ 1
    2. School of Mathematical Science
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1597 - 1600
  • [42] Key Assignment Scheme with Authenticated Encryption
    Kandele, Suyash
    Paul, Souradyuti
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (04) : 150 - 196
  • [43] A Novel Cryptographic Key Exchange Scheme using Resistors
    Lin, Pey-Chang Kent
    Ivanov, Alex
    Johnson, Bradley
    Khatri, Sunil P.
    [J]. 2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 451 - 452
  • [44] Multi-Biometrics Based Cryptographic Key Regeneration Scheme
    Kanade, Sanjay
    Petrovska-Delacretaz, Dijana
    Dorizzi, Bernadette
    [J]. 2009 IEEE 3RD INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS, 2009, : 333 - 339
  • [45] A symmetric neural cryptographic key generation scheme for Iot security
    Arindam Sarkar
    [J]. Applied Intelligence, 2023, 53 : 9344 - 9367
  • [46] The Novel Cryptographic Key Generation and Distribution Scheme for Smart Grid
    Wang, Zhidong
    Liu, Piao
    Lin, Peixia
    Yang, Zhibin
    Liang, Mei
    Zuo, Hanmu
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON ELECTRIC UTILITY DEREGULATION AND RESTRUCTURING AND POWER TECHNOLOGIES (DRPT 2015), 2015, : 873 - 875
  • [47] A symmetric neural cryptographic key generation scheme for Iot security
    Sarkar, Arindam
    [J]. APPLIED INTELLIGENCE, 2023, 53 (08) : 9344 - 9367
  • [48] A New Cryptographic Key Generation Scheme Using Psychological Signals
    Akhila, V. A.
    Arunvinodh, C.
    Reshmi, K. C.
    Sakthiprasad, K. M.
    [J]. 1ST GLOBAL COLLOQUIUM ON RECENT ADVANCEMENTS AND EFFECTUAL RESEARCHES IN ENGINEERING, SCIENCE AND TECHNOLOGY - RAEREST 2016, 2016, 25 : 286 - 292
  • [49] A model of hierarchical key assignment scheme with CRT
    Zhao, Jing
    Zhang, Zhigang
    Xu, Maozhi
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 815 - +
  • [50] A Scheme for the Generation of Strong Cryptographic Key Pairs based on fCMetrics
    Tahir, Ruhma
    Hu, Huosheng
    Gu, Dongbing
    McDonald-Maier, Klaus
    Howells, Gareth
    [J]. 2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 168 - 174