Reliable Key Distribution Scheme for Lossy Channels
スポンサーリンク
概要
- 論文の詳細を見る
We address reliable key distribution scheme for lossy channels such as wireless or power line. In the key distribution over these lossy channels, if key information is lost, there is critical issue that the subsequent communication is disabled. In this paper, we show that our proposal has more reliable property than the related works and has the reliable property equivalent to the dedicated communication channels such as Ethernet.
- (社)電子情報通信学会の論文
- 2008-05-01
著者
-
NISHI Ryuzou
Panasonic Communications Co., Ltd.
-
HORI Yoshiaki
Department of Computer Science and Communication Engineering, Kyushu University
-
SAKURAI Kouichi
Department of Computer Science and Communication Engineering, Kyushu University
-
Sakurai Kouichi
Department Of Computer Science And Communication Engineering Kyushu University
-
Hori Yoshiaki
Kyushu Univ. Fukuoka‐shi Jpn
-
Nishi Ryuzou
Panasonic Communications Co. Ltd.
-
Sakurai Kouichi
Department Of Computer Science And Communication Engineering Faculty Of Information Science And Elec
-
Hori Yoshiaki
Department Of Computer Science And Communication Engineering Kyushu University
-
Sakurai Kouichi
Department Of Applied Science Faculty Of Engineering 36 Kyushu University
関連論文
- Reliable Key Distribution Scheme for Lossy Channels
- On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis (Special Section on Cryptography and Information Security)
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Long-Term Continuous versus Intermittent Cyclosporin : Therapy for Psoriasis
- Differential Cell- and Immuno-Biological Properties of Murine B16-F1 and F10 Melanomas : Oncogene c-fos Expression, Sensitivity to LAK Cells and/or IL-2, and Components of Gangliosides
- Quality of Assured Service through Multiple DiffServ Domains(Special Issue on New Technologies in the Internet and their Applications)
- Queue Management of RIO to Achieve High Throughput and Low Delay (Special Issue on Internet Technology II)
- Increase in the peripheral lymphocyte populations expressing CD54 (ICAM-1) after hyperthermic isolated limb perfusion in patients with malignant melanoma : an analysis of four cases
- In vitro Comparison between Mouse B16 and Human Melanoma Cell Lines of the Expression of ICAM-1 Induced by Cytokines and/or Hyperthermia
- Two Cases of Metastatic Malignant Melanoma of the Lower Limb Treated with Hyperthermic Isolated Limb Perfusion and Concomitant Infusion of Either Carboplatin or β-Interferon
- The proliferative properties of tumor cells differentially correlate with the host immune responses in anogenital Bowen's disease
- Kinetics of immunological parameters in patients with malignant melanoma treated with hyperthermic isolated limb perfusion
- A reliability analysis based scheduling algorithm in heterogeneous system
- A Flexible User-centric Resource Scheduling Algorithm
- In vitro analysis of mediators of contact urticaria caused by cefotiam hydrochloride
- Analysis and Comparison of Crytographic Techniques in E-voting and E-auction
- 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
- Reliable Key Distribution Scheme for Lossy Channels
- D-031 Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
- Private Data Clustering based on Secure Approximation
- Reduced amount of secretory component of IgA secretion in tears of patients with atopic dermatitis
- Case Report : Gianotti-Crosti Syndrome Associated with Human Herpesvirus-6 Infection
- Insulin Resistance Type A syndrome in a 12-year-old Girl
- Increased Serum Level of Interleukin-6 in Patients with Psoriatic Arthritis and Thrombocytosis
- Analysis and Design for Private Message Board Systems
- On the Complexity of the Discrete Logarithm for a General Finite Group (Special Section on Cryptography and Information Security)
- Promotion of Tyrosinase Folding in Cos 7 Cells by Calnexin
- Performance Evaluation of UDP Traffic Affected by TCP Flows(Special Issue on Multimedia Communications in Heterogeneous Network Environments)
- Improved Subset Difference Method with Ternary Tree
- Towards a Fairness Multimedia Transmission Using Layered-Based Multicast Protocol
- Computerized Colorimetry in Screening for Malignant Melanomas
- Experimental approaches for the treatment of murine B16 melanomas of various sizes : II : Injection of ethanol with combinations of β-interferon and microwaval hyperthermia for B16 melanomas with a size of greater than 10mm in diameter
- Experimental approaches for the treatment of murine B16 melanomas of various sizes : I : Local injection of ethanol with a combination of interleukin-2 or microwaval hyperthermia for B16 melanomas with a size of less than 7mm in diameter
- Rapid Destruction of Murine and Human Melanomas by Local Injection of Absolute Ethanol : Augmentation of the Anti-proliferative Effects with a Combination of Biological Response Modifiers
- On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks(Tamper-Resistance)(Cryptography and Information Security)
- Proposal and Analysis of a Distributed Online Certificate Status Protocol with Low Communication Cost(Application)(Cryptography and Information Security)
- Analysis and Design for Private Message Board Systems (Applications) (Cryptography and Information Security)
- Special Section on Discrete Mathematics and Its Applications
- Immune Thrombocytopenia Due to Tranilast (Rizaben^【○!R】) : Detection of Drug-dependent Platelet-associated IgG
- Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs
- Securing Provenance of Distributed Processes in an Untrusted Environment
- Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs
- Equivalence problem and automorphisms of some abelian branched coverings of the Riemann sphere