An authenticated self-healing key distribution scheme based on bilinear pairings
Self-healing key distribution mechanism can be utilized for distributing session keys over an unreliable network.A self-healing key distribution scheme using bilinear pairings is proposed in this paper. As far as we know, it is the first pairingbased authenticated self-healing key distribution schem...
| Main Authors: | Tian, Biming, Chang, Elizabeth, Hussain, Farookh Khadeer, Dillon, Tharam S., Han, Song |
|---|---|
| Other Authors: | Simon Gibbs, Alan Messer |
| Format: | Conference Paper |
| Published: |
IEEE
2009
|
| Online Access: | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4784779 http://hdl.handle.net/20.500.11937/34704 |
Similar Items
A self-healing and mutual-healing key distribution scheme using bilinear pairings for wireless networks
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
An efficient self-healing key distribution scheme
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
A mutual-healing key distribution scheme in wireless sensor networks
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
A self-healing key distribution scheme based on vector space secret sharing and one way hash chains
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
Generalized hash-binary-tree based self-healing key distribution with implicit authentication
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
Secure web services using two-way authentication and three-party key establishment for service delivery
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
A key management scheme for heterogeneous sensor networks using keyed-hash chain
by: Tian, Biming, et al.
Published: (2009)
by: Tian, Biming, et al.
Published: (2009)
Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
Bilinear-pairing-based remote user authentication schemes using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks
by: Tian, Biming, et al.
Published: (2010)
by: Tian, Biming, et al.
Published: (2010)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Anonymous mutual authentication protocol for RFID tag without back-end database
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Bilinear pairings computation using the extended double-base chains algorithm
by: Mohammed Ismail, Abdulwahed, et al.
Published: (2010)
by: Mohammed Ismail, Abdulwahed, et al.
Published: (2010)
Using non-commutative monoids for construct three-party key establishment
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
A combinational approach for trust establishment in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
RFID mutual authentication protocols for tags and readers with and without a server
by: Han, Song, et al.
Published: (2013)
by: Han, Song, et al.
Published: (2013)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
Defining trustworthiness in service oriented environment
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
Aspects influencing trustworthiness in service oriented environments
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
Comparative analysis of trust and security
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
Trust issues in a service oriented environment
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
Trust onology for service-oriented environment
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
Authenticated spectrum sharing for secondary users in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Improvement of a convertible undeniable partially blind signature scheme
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Ascertaining the semantic and linguistic level of perceived risk in e-business interactions
by: Hussain, Omar, et al.
Published: (2008)
by: Hussain, Omar, et al.
Published: (2008)
Transactional risk-based decision making system in e-business interactions
by: Hussain, Omar, et al.
Published: (2010)
by: Hussain, Omar, et al.
Published: (2010)
A methodology for transactional risk assessment and decision making in e-business interactions
by: Hussain, Omar, et al.
Published: (2009)
by: Hussain, Omar, et al.
Published: (2009)
Quantifying the numeric and linguistic magnitude of perceived risk in e-commerce interactions for RDSS
by: Hussain, Omar, et al.
Published: (2008)
by: Hussain, Omar, et al.
Published: (2008)
A fuzzy inference model for risk based informed decision-making in e-business
by: Hussain, Omar, et al.
Published: (2009)
by: Hussain, Omar, et al.
Published: (2009)
Determining the failure level for risk analysis in an e-commerce interaction
by: Hussain, Omar, et al.
Published: (2008)
by: Hussain, Omar, et al.
Published: (2008)
Towards quantifying the possible risk in e-commerce interactions for RDSS
by: Hussain, Omar, et al.
Published: (2007)
by: Hussain, Omar, et al.
Published: (2007)
Highlighting the issues in making an informed interaction-based decision in industrial ecosystems
by: Hussain, Omar, et al.
Published: (2008)
by: Hussain, Omar, et al.
Published: (2008)
Probabilistic assessment of financial risk in e-business associations
by: Hussain, Omar, et al.
Published: (2010)
by: Hussain, Omar, et al.
Published: (2010)
Probabilistic assessment of loss in revenue generation in demand-driven production
by: Hussain, Omar, et al.
Published: (2011)
by: Hussain, Omar, et al.
Published: (2011)
Communicating recommendations in a service-oriented environment
by: Hussain, Omar, et al.
Published: (2007)
by: Hussain, Omar, et al.
Published: (2007)
Similar Items
-
A self-healing and mutual-healing key distribution scheme using bilinear pairings for wireless networks
by: Tian, Biming, et al.
Published: (2008) -
An efficient self-healing key distribution scheme
by: Tian, Biming, et al.
Published: (2008) -
A mutual-healing key distribution scheme in wireless sensor networks
by: Tian, Biming, et al.
Published: (2011) -
A self-healing key distribution scheme based on vector space secret sharing and one way hash chains
by: Tian, Biming, et al.
Published: (2008) -
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)