Blockchain for digital rights management

Z Ma, M Jiang, H Gao, Z Wang - Future Generation Computer Systems, 2018 - Elsevier
Online digital content service becomes more and more easily, however, free consumption
and excessive spreading without rights protection will hurt the content providers' benefits …

The security and privacy of smart vehicles

JP Hubaux, S Capkun, J Luo - IEEE Security & Privacy, 2004 - ieeexplore.ieee.org
The security and privacy of smart vehicles Page 1 Making Wireless Work Current traffic-safety
statistics are notoriously horrific. Approximately 40,000 people are killed each year on the …

[LIVRE][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

A framework for classifying and comparing architecture-centric software evolution research

P Jamshidi, M Ghafari, A Ahmad… - 2013 17th European …, 2013 - ieeexplore.ieee.org
Context: Software systems are increasingly required to operate in an open world,
characterized by continuous changes in the environment and in the prescribed …

Provably secure authenticated group Diffie-Hellman key exchange

E Bresson, O Chevassut, D Pointcheval - ACM Transactions on …, 2007 - dl.acm.org
Authenticated key-exchange protocols allow two participants A and B, communicating over a
public network and each holding an authentication means to exchange a shared secret …

Key agreement in dynamic peer groups

M Steiner, G Tsudik, M Waidner - IEEE Transactions on Parallel …, 2000 - ieeexplore.ieee.org
As a result of the increased popularity of group-oriented applications and protocols, group
communication occurs in many different settings: from network multicasting to application …

Scyther: Semantics and verification of security protocols

CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …

Scalable protocols for authenticated group key exchange

J Katz, M Yung - Annual international cryptology conference, 2003 - Springer
We consider the fundamental problem of authenticated group key exchange among n
parties within a larger and insecure public network. A number of solutions to this problem …

[LIVRE][B] Security properties

C Cremers, S Mauw, C Cremers, S Mauw - 2012 - Springer
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …

Quantum key agreement protocol based on BB84

SK Chong, T Hwang - Optics Communications, 2010 - Elsevier
This work presents a quantum key agreement (QKA) based on the BB84 protocol. The newly
proposed QKA protocol enables two involved parties to jointly establish a shared secret key …