D Wu, C Zhou - IEEE Transactions on Smart Grid, 2011 - ieeexplore.ieee.org
In this paper, we study the problem of secure key management for smart grid. Since existing key management schemes are not suitable for deployment in smart grid, in this paper, we …
RL Gregg, S Giri, TC Goeke - US Patent 9,413,768, 2016 - Google Patents
(57) ABSTRACT A system for securing and tracking usage of transaction Ser vices or computer resources by a client computer from a first server computer, which includes …
M Zhang, Y Fang - IEEE Transactions on wireless …, 2005 - ieeexplore.ieee.org
This paper analyzes the authentication and key agreement protocol adopted by Universal Mobile Telecommunication System (UMTS), an emerging standard for third-generation (3G) …
Although much literature exists on the subject of RSA and public-key cryptography, until now there has been no single source that reveals recent developments in the area at an …
M Abadi, C Fournet - Theoretical Computer Science, 2004 - Elsevier
Frequently, communication between two principals reveals their identities and presence to third parties. These privacy breaches can occur even if security protocols are in use; indeed …
C Tang, DO Wu - IEEE Transactions on Wireless …, 2008 - ieeexplore.ieee.org
This paper proposes an efficient authentication scheme, which is suitable for low-power mobile devices. It uses an elliptic-curve-eryptosystem based trust delegation mechanism to …
D Samfat, R Molva, N Asokan - … of the 1st annual international conference …, 1995 - dl.acm.org
User mobility is a feature that raises many new security-related issues and concerns. One of them is the disclosure of a mobile user's reai identity during the authentication process, or …
MJP Wary - US Patent 6,745,326, 2004 - Google Patents
US6745326B1 - Authentication process including setting up a secure channel between a subscriber and a service provider accessible through a telecommunications operator …
A variety of wireless technologies have been standardized and commercialized, but no single technology is considered the best because of different coverage and bandwidth …