Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/445801
Full metadata record
DC FieldValueLanguage
dc.contributorMa, RickCheng, Samuelen_US
dc.date2008en_US
dc.date.accessioned2020-05-18T12:56:20Z-
dc.date.available2020-05-18T12:56:20Z-
dc.date.issued2008en_US
dc.identifier.issn1409107en_US
dc.identifier.urihttp://localhost/handle/Hannan/382160en_US
dc.identifier.urihttp://localhost/handle/Hannan/445801-
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractIn 2009, Han et al.proposed anefficient threshold self-healing key distribution scheme with sponsorization for infrastructureless wireless networks. They claimed that the key distribution scheme satisfies the forward security, i.e., any inter- nal user who has been revoked can not generate a new session key. In this paper,an attack method against this key distribution schemes forward security was presented. Furthermore, this attack method can also be applied to this schemes backward security.Thus,the original threshold self-healing key distribution scheme is insecure.en_US
dc.relation.haspartAL436064.pdfen_US
dc.subjectScience & Technologyen_US
dc.subject.other10.1109/TCSVT.2011.2125630en_US
dc.titleTransactions Lettersen_US
dc.typeArticleen_US
dc.journal.titleOctoberen_US
Appears in Collections:2002-2008

Files in This Item:
File SizeFormat 
AL436064.pdf184.51 kBAdobe PDF
Full metadata record
DC FieldValueLanguage
dc.contributorMa, RickCheng, Samuelen_US
dc.date2008en_US
dc.date.accessioned2020-05-18T12:56:20Z-
dc.date.available2020-05-18T12:56:20Z-
dc.date.issued2008en_US
dc.identifier.issn1409107en_US
dc.identifier.urihttp://localhost/handle/Hannan/382160en_US
dc.identifier.urihttp://localhost/handle/Hannan/445801-
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractIn 2009, Han et al.proposed anefficient threshold self-healing key distribution scheme with sponsorization for infrastructureless wireless networks. They claimed that the key distribution scheme satisfies the forward security, i.e., any inter- nal user who has been revoked can not generate a new session key. In this paper,an attack method against this key distribution schemes forward security was presented. Furthermore, this attack method can also be applied to this schemes backward security.Thus,the original threshold self-healing key distribution scheme is insecure.en_US
dc.relation.haspartAL436064.pdfen_US
dc.subjectScience & Technologyen_US
dc.subject.other10.1109/TCSVT.2011.2125630en_US
dc.titleTransactions Lettersen_US
dc.typeArticleen_US
dc.journal.titleOctoberen_US
Appears in Collections:2002-2008

Files in This Item:
File SizeFormat 
AL436064.pdf184.51 kBAdobe PDF
Full metadata record
DC FieldValueLanguage
dc.contributorMa, RickCheng, Samuelen_US
dc.date2008en_US
dc.date.accessioned2020-05-18T12:56:20Z-
dc.date.available2020-05-18T12:56:20Z-
dc.date.issued2008en_US
dc.identifier.issn1409107en_US
dc.identifier.urihttp://localhost/handle/Hannan/382160en_US
dc.identifier.urihttp://localhost/handle/Hannan/445801-
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractIn 2009, Han et al.proposed anefficient threshold self-healing key distribution scheme with sponsorization for infrastructureless wireless networks. They claimed that the key distribution scheme satisfies the forward security, i.e., any inter- nal user who has been revoked can not generate a new session key. In this paper,an attack method against this key distribution schemes forward security was presented. Furthermore, this attack method can also be applied to this schemes backward security.Thus,the original threshold self-healing key distribution scheme is insecure.en_US
dc.relation.haspartAL436064.pdfen_US
dc.subjectScience & Technologyen_US
dc.subject.other10.1109/TCSVT.2011.2125630en_US
dc.titleTransactions Lettersen_US
dc.typeArticleen_US
dc.journal.titleOctoberen_US
Appears in Collections:2002-2008

Files in This Item:
File SizeFormat 
AL436064.pdf184.51 kBAdobe PDF