Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
In this paper we will present a very light-weight still provably secure authentication protocol not aiming at inferring the involved entities' identities but re ...
general case of authentication in pervasive networks which we call zero common- knowledge (ZCK) authentication. We presented three instantiations. The ...
Abstract. Ad-hoc networks and even more intrinsic pervasive networks face huge security lacks. In the most general case entities need to build.
Sign up for an account to create a profile with publication list, tag and review your related work, and share bibliographies with your co-authors. Zero Common ...
Bibliographic details on Zero Common-Knowledge Authentication for Pervasive Networks.
Zero common-knowledge authentication for pervasive networks. In Se- lected Areas in Cryptography, volume 3006 of Lecture Notes in Computer Science, pages 73 ...
Zero Common-Knowledge Authentication for Pervasive Networks · Non-interactive two-channel message authentication based on hybrid-collision resistant hash ...
Zero common-knowledge authentication for pervasive networks. A Weimerskirch, D Westhoff. Selected Areas in Cryptography: 10th Annual International Workshop, SAC ...
In the proposed scheme, authentication control, admission control and revocation control are used in order to provide security services for P2P networks.
We formulate trust as a function of quality of a task and time required to authenticate agent-to-agent relationship based on the Zero-Common Knowledge (ZCK) ...