Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/480627
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ma, Rick | en_US |
dc.contributor.author | Cheng, Samuel | en_US |
dc.date.accessioned | 2020-05-19T12:23:04Z | - |
dc.date.available | 2020-05-19T12:23:04Z | - |
dc.date.issued | 2011 | en_US |
dc.identifier.issn | 1409107 | en_US |
dc.identifier.other | 10.1109/TCSVT.2011.2125630 | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/291315 | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/480627 | - |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | In 2009, Han et al.proposed anefficient threshold self-healing key distribution scheme with sponsorization for infrastructureless wireless networks. They claimed that the key distribution scheme satisfies the forward security, i.e., any inter- nal user who has been revoked can not generate a new session key. In this paper,an attack method against this key distribution schemes forward security was presented. Furthermore, this attack method can also be applied to this schemes backward security.Thus,the original threshold self-healing key distribution scheme is insecure. | en_US |
dc.relation.haspart | AL1920076.pdf | en_US |
dc.subject | Science & Technology | en_US |
dc.title | Transactions Letters | en_US |
dc.type | Article | en_US |
dc.type | Article | en_US |
dc.journal.title | October | en_US |
Appears in Collections: | 2011 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
AL1920076.pdf | 359.32 kB | Adobe PDF | ![]() Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ma, Rick | en_US |
dc.contributor.author | Cheng, Samuel | en_US |
dc.date.accessioned | 2020-05-19T12:23:04Z | - |
dc.date.available | 2020-05-19T12:23:04Z | - |
dc.date.issued | 2011 | en_US |
dc.identifier.issn | 1409107 | en_US |
dc.identifier.other | 10.1109/TCSVT.2011.2125630 | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/291315 | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/480627 | - |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | In 2009, Han et al.proposed anefficient threshold self-healing key distribution scheme with sponsorization for infrastructureless wireless networks. They claimed that the key distribution scheme satisfies the forward security, i.e., any inter- nal user who has been revoked can not generate a new session key. In this paper,an attack method against this key distribution schemes forward security was presented. Furthermore, this attack method can also be applied to this schemes backward security.Thus,the original threshold self-healing key distribution scheme is insecure. | en_US |
dc.relation.haspart | AL1920076.pdf | en_US |
dc.subject | Science & Technology | en_US |
dc.title | Transactions Letters | en_US |
dc.type | Article | en_US |
dc.type | Article | en_US |
dc.journal.title | October | en_US |
Appears in Collections: | 2011 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
AL1920076.pdf | 359.32 kB | Adobe PDF | ![]() Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ma, Rick | en_US |
dc.contributor.author | Cheng, Samuel | en_US |
dc.date.accessioned | 2020-05-19T12:23:04Z | - |
dc.date.available | 2020-05-19T12:23:04Z | - |
dc.date.issued | 2011 | en_US |
dc.identifier.issn | 1409107 | en_US |
dc.identifier.other | 10.1109/TCSVT.2011.2125630 | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/291315 | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/480627 | - |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | In 2009, Han et al.proposed anefficient threshold self-healing key distribution scheme with sponsorization for infrastructureless wireless networks. They claimed that the key distribution scheme satisfies the forward security, i.e., any inter- nal user who has been revoked can not generate a new session key. In this paper,an attack method against this key distribution schemes forward security was presented. Furthermore, this attack method can also be applied to this schemes backward security.Thus,the original threshold self-healing key distribution scheme is insecure. | en_US |
dc.relation.haspart | AL1920076.pdf | en_US |
dc.subject | Science & Technology | en_US |
dc.title | Transactions Letters | en_US |
dc.type | Article | en_US |
dc.type | Article | en_US |
dc.journal.title | October | en_US |
Appears in Collections: | 2011 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
AL1920076.pdf | 359.32 kB | Adobe PDF | ![]() Preview File |