Sponsored by the National Natural Science Foundation of China (Grant No.60203012) and Shanghai Rising-Star Program in Science and Technology (Grant No.02QD14027).
Several muhicast key management schemes such as those proposed by Wallner et al and Wong et al are based on a multilevel, logical hierarchy (or tree) of key-encrypting keys. When used in conjunction with a reliahle ...
Sponsored by the National Natural Science Foundation of China (Grant No. 60203012).
This paper compares two types of access methods in 3G telecommunication systems, registration based access method and alternative access method. Through analyzing their common ground, we establish a public-key based u...
Sponsored bythe National Natural Science Foundation of China(60203012)
An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-e...