Academic literature on the topic 'Hierarchical key Agreement'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hierarchical key Agreement.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Hierarchical key Agreement"
Lee, Sung-Woon, and Hyunsung Kim. "Freshness Consideration of Hierarchical Key Agreement Protocol in WSNs." International Journal of Security and Its Applications 8, no. 1 (January 31, 2014): 81–92. http://dx.doi.org/10.14257/ijsia.2014.8.1.08.
Full textGuo, Hua, Yi Mu, Zhoujun Li, and Xiyong Zhang. "An efficient and non-interactive hierarchical key agreement protocol." Computers & Security 30, no. 1 (January 2011): 28–34. http://dx.doi.org/10.1016/j.cose.2010.10.003.
Full textAlimoradi, Reza, Fateme Amjadi, Seiied-Mohammad-Javad Razavian, and M. H. Noorallahzadeh. "A Modified Hierarchical Multiple Key Agreement Scheme for WSN." International Journal of Advanced Networking and Applications 14, no. 03 (2022): 5493–98. http://dx.doi.org/10.35444/ijana.2022.14312.
Full textMao, Kefei, Jianwei Liu, and Jie Chen. "Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS." Journal of Electrical and Computer Engineering 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/1905872.
Full textMao, Kefei, Jie Chen, and Jianwei Liu. "An Secure Hierarchical Key Agreement Scheme for Wireless Sensor Networks." International Journal of Multimedia and Ubiquitous Engineering 9, no. 9 (September 30, 2016): 187–202. http://dx.doi.org/10.14257/ijmue.2016.11.9.20.
Full textKim, Hyunsung. "Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS." Sensors 14, no. 12 (December 10, 2014): 23742–57. http://dx.doi.org/10.3390/s141223742.
Full textZhang, Qikun, Zengyu Cai, Yong Gan, Yuan Zhuang, and Bingli Wang. "An authenticated hierarchical asymmetric group key agreement protocol based on identity." International Journal of Embedded Systems 11, no. 6 (2019): 815. http://dx.doi.org/10.1504/ijes.2019.10025637.
Full textGan, Yong, Bingli Wang, Yuan Zhuang, Zengyu Cai, and Qikun Zhang. "An authenticated hierarchical asymmetric group key agreement protocol based on identity." International Journal of Embedded Systems 11, no. 6 (2019): 815. http://dx.doi.org/10.1504/ijes.2019.104006.
Full textZhang, Qikun, Xianmin Wang, Junling Yuan, Lu Liu, Ruifang Wang, Hong Huang, and Yuanzhang Li. "A hierarchical group key agreement protocol using orientable attributes for cloud computing." Information Sciences 480 (April 2019): 55–69. http://dx.doi.org/10.1016/j.ins.2018.12.023.
Full textZhu, Guobin, Hu Xiong, and Zhiguang Qin. "On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol." Wireless Personal Communications 74, no. 2 (July 23, 2013): 883–89. http://dx.doi.org/10.1007/s11277-013-1328-0.
Full textDissertations / Theses on the topic "Hierarchical key Agreement"
Tiwari, Mayank. "Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement." Thesis, 2018. https://etd.iisc.ac.in/handle/2005/4080.
Full textIndian Institute of Science
Tiwari, Mayank. "Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement." Thesis, 2018. https://etd.iisc.ac.in/handle/2005/4352.
Full textChu, Chih Wei, and 朱志偉. "Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/15859437104079794941.
Full text長庚大學
資訊管理學研究所
97
With the progress of information technology, the computer crimes are emerging in an endless stream. It is because of the user’s privacy should be protected, when the user submit a service request to the service provider, both of them should check the identity of the other, and then build a shared key to accomplish the service request. Furthermore, when a conference is held, the chairman must verify the identities of all participants; afterwards, the chairman chooses a conference key and distributes it to legitimate participants. Besides, the participants should know who is in the conference. These prevent the malicious adversary from eavesdropping or impersonating to get some benefits. From the above point of view, and consideration of the security and performance in the system, we adopt the identity-based cryptosystem and the elliptic curve cryptosystem to design our protocols. Since the protocols have shorter key size, lower costs of management the keys, and lower costs of transformation, they are suitable for applying in various platforms, such as the smart card, mobile phone, and other lower storage devices. In this thesis, there are three distinct types of protocol: privacy-preserved identification protocol with key agreement, privacy-preserved conference key distribution protocol, and hierarchical conference key distribution protocols preserving user privacy to satisfy different communication environments.
Chih-Wei, Chu, and 朱志偉. "Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/75214608248583788202.
Full text長庚大學
資訊管理研究所
98
With the progress of information technology, the computer crimes are emerging in an endless stream. It is because of the user’s privacy should be protected, when the user submit a service request to the service provider, both of them should check the identity of the other, and then build a shared key to accomplish the service request. Furthermore, when a conference is held, the chairman must verify the identities of all participants; afterwards, the chairman chooses a conference key and distributes it to legitimate participants. Besides, the participants should know who is in the conference. These prevent the malicious adversary from eavesdropping or impersonating to get some benefits. From the above point of view, and consideration of the security and performance in the system, we adopt the identity-based cryptosystem and the elliptic curve cryptosystem to design our protocols. Since the protocols have shorter key size, lower costs of management the keys, and lower costs of transformation, they are suitable for applying in various platforms, such as the smart card, mobile phone, and other lower storage devices. In this thesis, there are three distinct types of protocol: privacy-preserved identification protocol with key agreement, privacy-preserved conference key distribution protocol, and hierarchical conference key distribution protocols preserving user privacy to satisfy different communication environments.
Book chapters on the topic "Hierarchical key Agreement"
Kim, Hyunsung. "Freshness Preserving Hierarchical Key Agreement Protocol Over Hierarchical MANETs." In Lecture Notes in Electrical Engineering, 927–33. Dordrecht: Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-6738-6_114.
Full textKim, Hyunsung. "Non-interactive Hierarchical Key Agreement Protocol over Hierarchical Wireless Sensor Networks." In Communications in Computer and Information Science, 86–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35264-5_12.
Full textSarkar, Pinaki. "Lightweight Deterministic Non Interactive (ni) Hierarchical Key Agreement Scheme (KAS)." In Network and System Security, 315–31. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_23.
Full textGennaro, Rosario, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, and Stephen D. Wolthusen. "Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs." In Computer Security - ESORICS 2008, 49–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88313-5_4.
Full textLin, Tzu-Wei, and Chien-Lung Hsu. "Privacy-Preserved Hierarchical Authentication and Key Agreement for AI-Enabled Telemedicine Systems." In 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications, 134–42. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-05491-4_14.
Full textSrinidhi, V., K. V. Lakshmy, and M. Sethumadhavan. "HGKA: Hierarchical Dynamic Group Key Agreement Protocol for Machine Type Communication in LTE Networks." In Communications in Computer and Information Science, 231–41. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-5826-5_17.
Full textSarkar, Pinaki, and Morshed Uddin Chowdhury. "Inductive Hierarchical Identity Based Key Agreement with Pre-deployment Interactions (i-H-IB-KA-pdi)." In Applications and Techniques in Information Security, 106–14. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-2741-3_9.
Full textBertolini, Alessio, and Daniel Clegg. "Access to Social Protection by Immigrants, Emigrants and Resident Nationals in the UK." In IMISCOE Research Series, 419–32. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51237-8_26.
Full textConference papers on the topic "Hierarchical key Agreement"
Xia, Jingbo, Yu Rongwei, and Xiaochuan Ai. "A New Efficient Hierarchical Key Agreement Scheme." In 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.80.
Full textEskeland, Sigurd, and Vladimir Oleshchuk. "Hierarchical Multi-Party Key Agreement for Wireless Networks." In Third International Symposium on Information Assurance and Security. IEEE, 2007. http://dx.doi.org/10.1109/isias.2007.4299748.
Full textEskeland, Sigurd, and Vladimir Oleshchuk. "Hierarchical Multi-Party Key Agreement for Wireless Networks." In Third International Symposium on Information Assurance and Security. IEEE, 2007. http://dx.doi.org/10.1109/ias.2007.82.
Full textWang, Shiuh-Jeng, Yuh-Ren Tsai, Chien-Chih Shen, and Pin-You Chen. "Hierarchical Key Agreement Protocols in Group-User Systems." In 2009 Fifth International Conference on Information Assurance and Security. IEEE, 2009. http://dx.doi.org/10.1109/ias.2009.152.
Full textXing, Qianqian, Baosheng Wang, Xiaofeng Wang, Jing Tao, and Liu Liu. "A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive Key Agreement for Wireless Networks." In 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, 2017. http://dx.doi.org/10.1109/trustcom/bigdatase/icess.2017.224.
Full textLin, Hua-Yi. "High-Effect Key Management Associated with Secure Data Transmission Approaches in Sensor Networks Using a Hierarchical-Based Cluster Elliptic Curve Key Agreement." In 2009 Fifth International Joint Conference on INC, IMS and IDC. IEEE, 2009. http://dx.doi.org/10.1109/ncm.2009.194.
Full textBuehler, Markus J., and Je´re´mie Bertaud. "Hierarchical Structure Controls Nanomechanical Properties of Vimentin Intermediate Filaments." In ASME 2010 First Global Congress on NanoEngineering for Medicine and Biology. ASMEDC, 2010. http://dx.doi.org/10.1115/nemb2010-13103.
Full textBaumstein, Anatoly, Partha Routh, Kyle Basler-Reeder, Young Ho Cha, David Tang, Jay Barr, and Alex Martinez. "Elastic Full Wavefield Inversion: The Benefits and the Challenges in Clastic and Subsalt Setting." In ADIPEC. SPE, 2022. http://dx.doi.org/10.2118/211620-ms.
Full text