Zobrazeno 1 - 10
of 136
pro vyhledávání: '"Sangjae Moon"'
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 9 (2013)
Security supports are a significant factor in the design of security system in ad hoc networks. It is particularly important to protect the identities of individual nodes to avoid personal privacy concerns. In this paper, we propose a security system
Externí odkaz:
https://doaj.org/article/fb388f7707ec413abafbe626aaa8e8fe
Publikováno v:
EURASIP Journal on Wireless Communications and Networking, Vol 2008 (2008)
Group key exchange (GKE) is one of the basic building blocks in securing group communication. A number of solutions to GKE problem have been proposed, but most of them are not scalable and require a number of rounds linear with the number of group me
Externí odkaz:
https://doaj.org/article/e8ea618995cf490ea65d663166325c1f
Publikováno v:
Journal of the Institute of Electronics and Information Engineers. 50:21-31
CP-ABE 방식은 신뢰된 서버 없이 접근 제어 메카니즘을 구현할 수 있다. 본 논문에서는 권한을 부여받은 사용자가 민감한 데이터에 접근할 수 있도록 CP-ABE 방식으로 속성기반 접근 제어 메카
Publikováno v:
Journal of the Korea Industrial Information Systems Research. 18:17-26
We have developed an ideal functionality for security requirement of functional encryption schemes. The functionality is needed when we want to show the security of a functional encryption scheme in universal composable (UC) framework. A functionalit
Publikováno v:
Journal of the Institute of Electronics Engineers of Korea. 50:70-79
Recently, there has been introduced various types of pairing computations to implement ID based cryptosystem for mobile ad hoc network. The Miller algorithm is the most popular algorithm for the typical pairing computation such as Weil, Tate and Ate.
Publikováno v:
Journal of the Institute of Electronics and Information Engineers. 50:64-72
Recently, stream cipher Rabbit was selected for the final eSTREAM portfolio organized by EU ECRYPT and as one of algorithm in part of ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization. However, a feasibility of practical power analysis a
Publikováno v:
The Journal of Korea Information and Communications Society. :1256-1262
Mobile ad hoc networks (MANETs) are infrastructure-less, autonomous, and stand-alone wireless networks with dynamic topologies. Recently, cluster-based ad hoc networks which enhance the security and efficiency of ad hoc networks are being actively re
Publikováno v:
INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences. 4:103-113
Publikováno v:
Journal of Cryptographic Engineering. 2:99-110
A series of algorithms for evaluation of multi-exponentiation are proposed based on the binary greatest common divisor algorithm. The proposed algorithms are inversion free and have the capability to evaluate double or multi-exponentiation with non-f
Publikováno v:
Journal of the Korea Industrial Information Systems Research. 16:13-18
Security supports are a significant factor in mobile ad hoc networks. Especially in dynamic topologies, considering cluster, key management is essential to provide a secure system. Recently, Li-Liu proposed ID-based multiple key management scheme for