Blockchain-based mutual-healing group key distribution scheme in unmanned aerial vehicles ad-hoc network
X Li, Y Wang, P Vijayakumar, D He… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
A dynamic group key is required for secure communication in the Unmanned Aerial Vehicles
Ad-Hoc Network (UAANET). However, due to the unreliable wireless channel and high …
Ad-Hoc Network (UAANET). However, due to the unreliable wireless channel and high …
A survey of group key distribution schemes with self-healing property
T Rams, P Pacyna - IEEE Communications Surveys & Tutorials, 2012 - ieeexplore.ieee.org
Secure key distribution schemes for group communications allow to establish a secure
multicast communication between a group manager and group members through an …
multicast communication between a group manager and group members through an …
PAWN: a payload‐based mutual authentication scheme for wireless sensor networks
Wireless sensor networks (WSNs) consist of resource‐starving miniature sensor nodes
deployed in a remote and hostile environment. These networks operate on small batteries …
deployed in a remote and hostile environment. These networks operate on small batteries …
Independent motion detection in 3D scenes
HS Sawhney, Y Guo, R Kumar - IEEE Transactions on Pattern …, 2000 - ieeexplore.ieee.org
This paper presents an algorithmic approach to the problem of detecting independently
moving objects in 3D scenes that are viewed under camera motion. There are two …
moving objects in 3D scenes that are viewed under camera motion. There are two …
Research on base64 encoding algorithm and PHP implementation
S Wen, W Dang - 2018 26th International Conference on …, 2018 - ieeexplore.ieee.org
In order to realize the data encryption of enterprise information platform, the principle of
Encryption and Decryption of Base64 algorithm is expatiated and explained in detail …
Encryption and Decryption of Base64 algorithm is expatiated and explained in detail …
A trusted and energy efficient approach for cluster-based wireless sensor networks
T Wang, G Zhang, X Yang… - International Journal of …, 2016 - journals.sagepub.com
How to improve both security and energy efficiency is one of the most prominent issues in
wireless sensor networks (WSNs). In this paper, we present a trusted and energy efficient …
wireless sensor networks (WSNs). In this paper, we present a trusted and energy efficient …
Secure group communication with self-healing and rekeying in wireless sensor networks
We have developed a self-healing key distribution scheme for secure multicast group
communications for wireless sensor network environment. We present a strategy for …
communications for wireless sensor network environment. We present a strategy for …
Group key management with efficient rekey mechanism: a semi-stateful approach for out-of-synchronized members
YR Chen, WG Tzeng - Computer Communications, 2017 - Elsevier
This paper addresses the problem of managing a cryptographic group key among a large
and highly dynamic group of members, who may miss group key update (rekey) messages …
and highly dynamic group of members, who may miss group key update (rekey) messages …
[HTML][HTML] A new key protocol design for cryptocurrency wallet
S Sung - ICT Express, 2021 - Elsevier
The majority of hacking accidents in cryptocurrency occur when the information of a
cryptocurrency wallet is stolen. Since the cryptocurrency wallet is simply used for a key …
cryptocurrency wallet is stolen. Since the cryptocurrency wallet is simply used for a key …
Modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance in wireless sensor …
X Sun, X Wu, C Huang, Z Xu, J Zhong - Ad Hoc Networks, 2016 - Elsevier
Though lots of research results about self-healing key management under unreliable links
have been proposed, there are still some shortcomings, such as the inefficiency of …
have been proposed, there are still some shortcomings, such as the inefficiency of …