Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Gestión de claves")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 280

  • Page / 12
Export

Selection :

  • and

Disenrollment with perfect forward secrecy in threshold schemesMINGYAN LI; POOVENDRAN, Radha.IEEE transactions on information theory. 2006, Vol 52, Num 4, pp 1676-1682, issn 0018-9448, 7 p.Article

An improved coding technique for image encryption and key managementXU WU; JIE MA; JIASHENG HU et al.SPIE proceedings series. 2005, pp 628-634, isbn 0-8194-5592-X, 7 p.Conference Paper

Efficient secure group management for SSMCHADDOUD, Ghassan; VARADHARAJAN, Vjiay.IEEE International Conference on Communications. 2004, isbn 0-7803-8533-0, vol3, 1436-1440Conference Paper

Analysis of an efficient group key agreement protocolSU MI LEE; DONG HOON LEE.IEEE communications letters. 2006, Vol 10, Num 8, pp 638-639, issn 1089-7798, 2 p.Article

Security analysis on a conference scheme for mobile communicationsZHIGUO WAN; FENG BAO; DENG, Robert H et al.IEEE transactions on wireless communications. 2006, Vol 5, Num 6, pp 1238-1240, issn 1536-1276, 3 p.Article

Sécurité des e-mails : PGP et S/MIME = E-mail security : PGP and S/MIMEMAIGRON, Patrick.Techniques de l'ingénieur. Sécurité des systèmes d'information. 2003, Vol SI1, Num H5330, pp H5330.1-H5330.17Article

Reactive key management scheme for access control in group communicationsKIM, Heeyoul; LEE, Younho; PARK, Yongsu et al.IEICE transactions on communications. 2007, Vol 90, Num 4, pp 982-986, issn 0916-8516, 5 p.Article

Local key exchange for mobile IPv6 local binding security associationCHANGWEN LIU; SOLIMAN, Hesham.IEEE Vehicular Technology Conference. 2004, pp 2647-2655, isbn 0-7803-8255-2, 5Vol, 9 p.Conference Paper

OpenIKEv2 : Design and Implementation of an IKEv2 Solution : Information and Communication System SecurityPEREZ MENDEZ, Alejandro; FERNANDEZ RUIZ, Pedro J; LOPEZ, Rafael Marin et al.IEICE transactions on information and systems. 2008, Vol 91, Num 5, pp 1319-1329, issn 0916-8532, 11 p.Article

TIRAMISU : A novel approach to content representation and key management for seamless super-distribution of protected mediaMARUSIC, Bostjan; DOBRAVEC, Stefan; DE CUETOS, Philippe et al.Signal processing. Image communication. 2005, Vol 20, Num 9-10, pp 947-971, issn 0923-5965, 25 p.Article

A Tree Key Graph Design Scheme for Hierarchical Multi-Group Access ControlKOO, Han-Seung; KWON, O-Hyung; RA, Sung-Woong et al.IEEE communications letters. 2009, Vol 13, Num 11, pp 874-876, issn 1089-7798, 3 p.Article

A hierarchical key management scheme for authentication of roaming mobile nodes between domains in mobile networksHONG, Kihun; JUNG, Souhwan.IEICE transactions on communications. 2006, Vol 89, Num 12, pp 3417-3420, issn 0916-8516, 4 p.Article

An ID-based broadcast encryption scheme for key distributionXINJUN DU; YING WANG; JIANHUA GE et al.IEEE transactions on broadcasting. 2005, Vol 51, Num 2, pp 264-266, issn 0018-9316, 3 p.Article

Certification électronique = Electronic certificationRIBIERE, Gérard.Techniques de l'ingénieur. Sécurité des systèmes d'information. 2003, Vol SI1, Num H5510, pp H5510.1-H5510.13Article

A computationally efficient key-hiding based group re-keying scheme for secure multicastingASEM, Y. M; KARA, A.International journal of computers & applications. 2006, Vol 28, Num 1, pp 65-73, issn 1206-212X, 9 p.Article

Dynamic security analysis of group key agreement protocolSUN, H; LIN, D. D.IEE proceedings. Communications. 2005, Vol 152, Num 2, pp 134-137, issn 1350-2425, 4 p.Article

A key management scheme for commodity sensor networksYONG HO KIM; MU HYUN KIM; DONG HOON LEE et al.Lecture notes in computer science. 2005, pp 113-126, issn 0302-9743, isbn 3-540-29132-6, 1Vol, 14 p.Conference Paper

An efficient application of a dynamic crypto system in mobile wireless securitySOLIMAN, Hamdy S; OMAN, Mohammed.IEEE Wireless Communications and Networking Conference. 2004, pp 837-842, isbn 0-7803-8344-3, 6 p.Conference Paper

Trust establishment in large scale grid settingsBO ZHU; TIEYAN LI; HUAFEI ZHU et al.Lecture notes in computer science. 2004, pp 317-324, issn 0302-9743, isbn 3-540-23564-7, 8 p.Conference Paper

Intra-cluster key sharing in hierarchical sensor networksLIU, Ya-Nan; WANG JIAN; DU HE et al.IET wireless sensor systems (Print). 2013, Vol 3, Num 3, pp 172-182, issn 2043-6386, 11 p.Article

A novel authenticated group key agreement protocol for mobile environmentTSAI, Jia-Lun.Annales des télécommunications. 2011, Vol 66, Num 11-12, pp 663-669, issn 0003-4347, 7 p.Article

Scalable protocols for authenticated group key exchangeKATZ, Jonathan; YUNG, Moti.Journal of cryptology. 2007, Vol 20, Num 1, pp 85-113, issn 0933-2790, 29 p.Article

An efficient LKH tree balancing algorithm for group key managementKWAK, Deuk-Whee; LEE, Seungjoo; KIM, Jongwon et al.IEEE communications letters. 2006, Vol 10, Num 3, pp 222-224, issn 1089-7798, 3 p.Article

Optimizing the tree structure in secure multicast key managementWEN TAO ZHU.IEEE communications letters. 2005, Vol 9, Num 5, pp 477-479, issn 1089-7798, 3 p.Article

An efficient group key agreement protocolBAE EUN JUNG.IEEE communications letters. 2006, Vol 10, Num 2, pp 106-107, issn 1089-7798, 2 p.Article

  • Page / 12