supported by the Hi-Tech Research and Development Program of China (2007AA01Z429,2007AA01Z405);the National Natural Science Foundation of China (60702059,60872041,11061035)
This article puts forward a new scheme to control message redundancy efficiently in delay tolerant mobile Ad-hoc networks (MANET). The class of networks generally lacks end-to-end connectivity. In order to improve t...
supported by the National High-Tech Research & Development Program of China (Grant Nos.2007AA01Z429, 2007AA01Z405);the Major Program of the National Natural Science Foundation of China (GrantNo. 60633020);the National Natural Science Foundation of China (Grant Nos. 60573036, 60702059,60503012,60872041);the Korea Research Foundation Grant funded by the Korean Government (Grant No. KRF-2008-521-D00449)
This paper analyzes trusted network connect (TNC) protocols within the universally composable (UC) framework. We propose the first TNC model in the UC framework by first designing the TNC ideal functionality FTNC,...
supported by the National High-Tech Research & Development Program of China (Grant Nos.2007AA01Z429, 2007AA01Z405);the Major Program of the National Natural Science Foundation of China (GrantNo. 60633020);the National Natural Science Foundation of China (Grant Nos. 60573036, 60702059, 60503012,60872041);the Korea Research Foundation Grant funded by the Korean Government (Grant No. KRF-2008-521-D00449)
Broadcast authentication is a vital security primitive for the management of a copious number of parties. In the universally composable framework, this paper investigates broadcast authentication using one-time signat...