منابع مشابه
Introducing Perfect Forward Secrecy for AN.ON
In this paper we discuss AN.ON’s need to provide perfect forward secrecy and show by an estimation of the channel build up time that the straight forward solution is not a practical solution. In the remaining paper we propose an improvement which enables AN.ON to provide perfect forward secrecy with respect to their current attacker model. Finally, we show that the delay, caused by our improvem...
متن کاملInterference Alignment with Imperfect Channel Knowledge and Secrecy Constraints
Please note that all the discussion referring to Theorem 5.4.1 has been revised accordingly. The corrected version of Chapter 5 has been published as follows: [WXSP15a] Zhao Wang, Ming Xiao, Mikael Skoglund, and H. Vincent Poor, “Secure degrees of freedom of wireless X networks using artificial noise alignment,” IEEE Trans. Commun., to appear. Online access: http://arxiv.org/abs/1410.5009. • 83...
متن کاملA WTLS Handshake Protocol with User Anonymity and Forward Secrecy
Forward secrecy and user anonymity are provided in the WTLS for the wireless Internet communications. Forward secrecy can be built by using Diffie-Hellman key agreement with random numbers in the Hello messages, and user anonymity by employing the signcryption scheme to the ClientKeyExchange and CertificateVerify procedure. In addition to these features, the modified WTLS handshake protocol has...
متن کاملProviding perfect forward secrecy for location-aware wireless sensor networks
Sensor nodes are resource-constrained, such as low battery life, computation, bandwidth and memory, so traditional public key schemes are impractical in wireless sensor networks. In the previous schemes, symmetric cryptography is the most common method used in sensor nodes. How to distribute keys into every sensor node is an important issue in many applications for hierarchical sensor networks....
متن کاملForward Secrecy and Its Application to Future Mobile Communications Security
Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (symmetric or asymmetric). The feature promises that even if a long-term private key is disclosed to any adversary, the session keys established in the protocol runs using the long-term key would not be compromised. The importanc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Communications of the ACM
سال: 2018
ISSN: 0001-0782,1557-7317
DOI: 10.1145/3292035