• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,302
Next 10 →

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

by Lein Harn , Changlu Lin
"... ABSTRACT Group communication implies a many-to-many communication and it goes beyond both one ..."
Abstract - Add to MetaCart
ABSTRACT Group communication implies a many-to-many communication and it goes beyond both one

Secure Group Communications Using Key Graphs

by Chung Kei Wong, Mohamed Gouda , Simon S. Lam - SIGCOMM '98 , 1998
"... Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group communications model, i.e., they require packet delivery from one or more authorized senders to a very large number of au ..."
Abstract - Cited by 556 (17 self) - Add to MetaCart
of authorized receivers. As a result, securing group communications (i.e., providing confidentiality, integrity, and authenticity of messages delivered between group members) will become a critical networking issue. In this paper, we present a novel solution to the scalability problem of group/multicast key

POSTER: Deniable Anonymous Group Authentication

by Ewa Syta, Bryan Ford
"... At first glance, anonymous authentication, the ability to authenticate yourself without revealing who you are, seems like a counterintuitive concept. However, it is surprisingly useful in many applications where a regular authentication ..."
Abstract - Add to MetaCart
At first glance, anonymous authentication, the ability to authenticate yourself without revealing who you are, seems like a counterintuitive concept. However, it is surprisingly useful in many applications where a regular authentication

On the Security of Homage Group Authentication Protocol

by Éliane Jaulmes, Guillaume Poupard - In: Syverson, P. (ed): Financial Cryptography 5th International Conference. Grand Cayman, British West Indies. LNCS , 2002
"... This paper describes two attacks on an anonymous group identification scheme proposed by Handley at Financial Crypto 2000. The first attack enables to forge valid proofs of membership for any secret key. As a consequence, any user, registered or not, can be properly authenticated by the group manage ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
This paper describes two attacks on an anonymous group identification scheme proposed by Handley at Financial Crypto 2000. The first attack enables to forge valid proofs of membership for any secret key. As a consequence, any user, registered or not, can be properly authenticated by the group

1 Question-Based Group Authentication

by Ann Nosseir, Richard Connor, Karen Renaud
"... There are various situations where a distinction needs to be made between group members and outsiders. For example, to protect students in chat groups from unpleasant incidents caused by intruders; or to provide access to common domains such as computer labs. In some of these situations the implicat ..."
Abstract - Add to MetaCart
There are various situations where a distinction needs to be made between group members and outsiders. For example, to protect students in chat groups from unpleasant incidents caused by intruders; or to provide access to common domains such as computer labs. In some of these situations

Further Reflection on Homage Anonymous Group Authentication Protocol

by Stewart Fleming, Sonil Gohil, Stewart Fleming, Sonil Gohil
"... Abstract. Anonymous group authentication provides an individual with the ability to prove membership of a group without revealing their identity. The Homage protocol proposed by Handley [9] provides an efficient mechanism for anonymous group authentication. Attacks have been proposed [11] on this pr ..."
Abstract - Add to MetaCart
Abstract. Anonymous group authentication provides an individual with the ability to prove membership of a group without revealing their identity. The Homage protocol proposed by Handley [9] provides an efficient mechanism for anonymous group authentication. Attacks have been proposed [11

A Lightweight Distributed Group Authentication Mechanism

by L. A. Martucci, T. C. M. B. Carvalho, W. V. Ruggiero
"... Identifying trustable devices and establishing secure tunnels between them in ad hoc network environments is a difficult task because it has to be quick, inexpensive and secure. Certificate-based authentication mechanisms are too expensive for small devices. The use of such mechanisms must be contro ..."
Abstract - Add to MetaCart
be controlled and reserved for special situations, (e.g. banking applications) but not for everyday transactions. In addition, indiscriminate use of asymmetric ciphering and certificate-based authentication is a shortcut to battery exhaustion attacks. This paper describes a lightweight distributed group

An Individual and Group Authentication Model for Wireless Network Services

by Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Bala Srinivasan, Huy Hoang Ngo*corresponding
"... Authentication is the most important component to protect information system from unauthorized access. Because mobile devices have resource limitations, current existing authentication methods experience security, efficiency, flexibility and scalability problems in wireless network services. Althoug ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
. Although many access control methods utilize both individuals and groups while validating authorization, there has been up to date no authentication mechanism supporting both group and individual. To overcome the existing problems, an authentication model for large scale wireless network is proposed

Efficient group authentication protocol based on human interaction

by L. H. Nguyen, A. W. Roscoe - In Proceedings of the Workshop on Foundation of Computer Security and Automated Reasoning Protocol Security Analysis (FCS-ARSPA , 2006
"... on human interaction ..."
Abstract - Cited by 21 (14 self) - Add to MetaCart
on human interaction

Sas-based group authentication and key agreement protocols

by Sven Laur, Sylvain Pasini - In Public Key Cryptography , 2008
"... Abstract. New trends in consumer electronics have created a strong demand for fast, reliable and user-friendly key agreement protocols. However, many key agreement protocols are secure only against passive attacks. Therefore, message authentication is often unavoidable in order to achieve security a ..."
Abstract - Cited by 17 (0 self) - Add to MetaCart
authenticity. In this article, we generalise this methodology for multi-party settings. We give a new group message authentication protocol that utilises only limited authenticated communication and show how to combine this protocol with classical key agreement procedures. More precisely, we describe how
Next 10 →
Results 1 - 10 of 2,302
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University