Reliable Key Distribution Scheme for Lossy Channels
スポンサーリンク
概要
- 論文の詳細を見る
We address reliable key distribution scheme for lossy channels such as wireless or power line. In the key distribution over these lossy channels, if key information is lost, there is critical issue that the subsequent communication is disabled. In this paper, we show that our proposal has more reliable property than the related works and has the reliable property equivalent to the dedicated communication channels such as Ethernet.
- (社)電子情報通信学会の論文
著者
-
Sakurai Kouichi
Kyushu Univ. Fukuoka‐shi Jpn
-
NISHI Ryuzou
Panasonic Communications Co., Ltd.
-
HORI Yoshiaki
Department of Computer Science and Communication Engineering, Kyushu University
-
SAKURAI Kouichi
Department of Computer Science and Communication Engineering, Kyushu University
関連論文
- ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
- A New Secret Sharing Scheme Based on the Multi-Dealer
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- Reliable Key Distribution Scheme for Lossy Channels
- On Effectiveness of Clock Control in Stream Ciphers(Information Theory and Its Applications)
- Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers(Cryptography and Information Security, Information Theory and Its Applications)
- On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis (Special Section on Cryptography and Information Security)
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- ESS-FH : Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
- Differential Cell- and Immuno-Biological Properties of Murine B16-F1 and F10 Melanomas : Oncogene c-fos Expression, Sensitivity to LAK Cells and/or IL-2, and Components of Gangliosides
- Increase in the peripheral lymphocyte populations expressing CD54 (ICAM-1) after hyperthermic isolated limb perfusion in patients with malignant melanoma : an analysis of four cases
- In vitro Comparison between Mouse B16 and Human Melanoma Cell Lines of the Expression of ICAM-1 Induced by Cytokines and/or Hyperthermia
- Two Cases of Metastatic Malignant Melanoma of the Lower Limb Treated with Hyperthermic Isolated Limb Perfusion and Concomitant Infusion of Either Carboplatin or β-Interferon
- An Enhanced Security Protocol for Fast Mobile IPv6
- A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6
- Modeling Security Bridge Certificate Authority Architecture
- An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation
- The proliferative properties of tumor cells differentially correlate with the host immune responses in anogenital Bowen's disease
- Kinetics of immunological parameters in patients with malignant melanoma treated with hyperthermic isolated limb perfusion
- A reliability analysis based scheduling algorithm in heterogeneous system
- A Flexible User-centric Resource Scheduling Algorithm
- In vitro analysis of mediators of contact urticaria caused by cefotiam hydrochloride
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- FOREWORD
- Analysis and Comparison of Crytographic Techniques in E-voting and E-auction
- Economic-inspired truthful reputation feedback mechanism in P2P networks
- On securing open networks through trust and reputation-architecture, challenges and solutions
- Reliable Key Distribution Scheme for Lossy Channels
- D-031 Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
- Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party
- Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes
- Private Data Clustering based on Secure Approximation
- Reduced amount of secretory component of IgA secretion in tears of patients with atopic dermatitis
- Case Report : Gianotti-Crosti Syndrome Associated with Human Herpesvirus-6 Infection
- Special Section on Cryptography and Information Security
- Insulin Resistance Type A syndrome in a 12-year-old Girl
- Increased Serum Level of Interleukin-6 in Patients with Psoriatic Arthritis and Thrombocytosis
- Analysis and Design for Private Message Board Systems
- On the Complexity of the Discrete Logarithm for a General Finite Group (Special Section on Cryptography and Information Security)
- Promotion of Tyrosinase Folding in Cos 7 Cells by Calnexin
- Efficient Context-Sensitive Intrusion Detection Based on State Transition Table
- Improved Subset Difference Method with Ternary Tree
- Computerized Colorimetry in Screening for Malignant Melanomas
- Experimental approaches for the treatment of murine B16 melanomas of various sizes : II : Injection of ethanol with combinations of β-interferon and microwaval hyperthermia for B16 melanomas with a size of greater than 10mm in diameter
- Experimental approaches for the treatment of murine B16 melanomas of various sizes : I : Local injection of ethanol with a combination of interleukin-2 or microwaval hyperthermia for B16 melanomas with a size of less than 7mm in diameter
- Rapid Destruction of Murine and Human Melanomas by Local Injection of Absolute Ethanol : Augmentation of the Anti-proliferative Effects with a Combination of Biological Response Modifiers