Keyword : key management


Mathematical Analysis of Secrecy Amplification in Key Infection
Dae Hyun YUM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/09/01
Vol. E99-D  No. 9 ; pp. 2390-2394
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
sensor networksmart dustkey managementkey infection
 Summary | Full Text:PDF(1.2MB)

CloudS: A Multi-Cloud Storage System with Multi-Level Security
Lu SHEN Shifang FENG Jinjin SUN Zhongwei LI Ming SU Gang WANG Xiaoguang LIU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/08/01
Vol. E99-D  No. 8 ; pp. 2036-2043
Type of Manuscript:  Special Section PAPER (Special Section on Security, Privacy and Anonymity of Internet of Things)
Category: 
Keyword: 
multi-cloudmulti-level securityerasure codedata dispersalkey management
 Summary | Full Text:PDF(968KB) | Errata[Uploaded on November 1,2016]

A Secure Communication Network Infrastructure Based on Quantum Key Distribution Technology
Yoshimichi TANIZAWA Ririka TAKAHASHI Hideaki SATO Alexander R. DIXON Shinichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2016/05/01
Vol. E99-B  No. 5 ; pp. 1054-1069
Type of Manuscript:  Special Section PAPER (Special Section on Internet Architectures and Management Methods that Enable Flexible and Secure Deployment of Network Services)
Category: 
Keyword: 
secure communicationnetwork infrastructurekey managementQuantum Key Distribution
 Summary | Full Text:PDF(2.9MB)

Location-Based Key Management Structure for Secure Group Communication in Wireless Sensor Networks
Jin Myoung KIM Tae Ho CHO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2013/09/01
Vol. E96-B  No. 9 ; pp. 2183-2189
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
wireless sensor networkskey managementgenetic algorithmgroup communicationsgraph partitioning
 Summary | Full Text:PDF(2.9MB) | Errata[Uploaded on January 1,2014]

Ubiquitous and Secure Certificate Service for Wireless Ad Hoc Network
Meng GE Kwok-Yan LAM Jianbin LI Siu-Leung CHUNG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/07/01
Vol. E93-D  No. 7 ; pp. 1848-1856
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
securityavailabilityad hoc networkskey managementcertificate authority
 Summary | Full Text:PDF(432.6KB)

DIRECT: Dynamic Key Renewal Using Secure Cluster Head Election in Wireless Sensor Networks
Gicheol WANG Kang-Suk SONG Gihwan CHO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/06/01
Vol. E93-D  No. 6 ; pp. 1560-1571
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
key managementcluster head electionwireless sensor networksintegrityenergy efficiency
 Summary | Full Text:PDF(1.8MB)

Security Analysis of the Lee-Lee-Kim-Jeong Hybrid Authentication and Key Distribution Scheme
Haeryong PARK 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2010/04/01
Vol. E93-B  No. 4 ; pp. 1013-1015
Type of Manuscript:  LETTER
Category: Network
Keyword: 
mobile multi-hop networkhybrid authenticationwireless mesh networkkey management
 Summary | Full Text:PDF(177.8KB)

A Secure and Scalable Rekeying Mechanism for Hierarchical Wireless Sensor Networks
Song GUO An-Ni SHEN Minyi GUO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/03/01
Vol. E93-D  No. 3 ; pp. 421-429
Type of Manuscript:  INVITED PAPER (Special Section on Trust, Security and Privacy for Pervasive Applications)
Category: 
Keyword: 
key managementgroup rekeyinghierarchical wireless sensor networksecurity
 Summary | Full Text:PDF(287.3KB)

An Efficient Encryption and Key Management Scheme for Layered Access Control of H.264/Scalable Video Coding
Su-Wan PARK Sang Uk SHIN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5 ; pp. 851-858
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Contents Protection
Keyword: 
H.264/SVCscalable video coding (SVC)encryptionkey managementaccess right
 Summary | Full Text:PDF(547.9KB)

Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks
Daeseon CHOI Younho LEE Yongsu PARK Seung-hun JIN Hyunsoo YOON 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2008/11/01
Vol. E91-B  No. 11 ; pp. 3574-3583
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
ad hoc networksnetwork securitykey managementself-organized
 Summary | Full Text:PDF(676.4KB)

OpenIKEv2: Design and Implementation of an IKEv2 Solution
Alejandro Perez MENDEZ Pedro J. Fernandez RUIZ Rafael Marin LOPEZ Gregorio Martinez PEREZ Antonio F. Gomez SKARMETA Kenichi TANIUCHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5 ; pp. 1319-1329
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Implementation
Keyword: 
IKEv2key managementIPsecnetwork securityopen-source
 Summary | Full Text:PDF(720.5KB)

Reliable Key Distribution Scheme for Lossy Channels
Ryuzou NISHI Yoshiaki HORI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5 ; pp. 1485-1488
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication System Security)
Category: Key Management
Keyword: 
key managementkey distributionwireless communication systemspower line communication systems
 Summary | Full Text:PDF(184.6KB)

Reactive Key Management Scheme for Access Control in Group Communications
Heeyoul KIM Younho LEE Yongsu PARK Hyunsoo YOON 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/04/01
Vol. E90-B  No. 4 ; pp. 982-986
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
group communicationgroup securitykey managementaccess controlreactive approach
 Summary | Full Text:PDF(205.8KB)

A Key Management Scheme for Secure Mobile IP Registration Based on AAA Protocol
Hyun-Sun KANG Chang-Seop PARK 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/06/01
Vol. E89-A  No. 6 ; pp. 1842-1846
Type of Manuscript:  PAPER
Category: Mobile Information Network and Personal Communications
Keyword: 
mobile IPregistration protocolAAAauthenticationkey management
 Summary | Full Text:PDF(159.4KB)

Fingerprinting Protocol for On-Line Trade Using Information Gap between Buyer and Merchant
Minoru KURIBAYASHI Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/04/01
Vol. E89-A  No. 4 ; pp. 1108-1115
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
fingerprinting protocolkey managementasymmetric propertysymmetric cryptosystem
 Summary | Full Text:PDF(219.9KB)

Using Trapdoor Permutations in a Complete Subtree Method for Broadcast Encryption
Ryo NOJIMA Yuichi KAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/02/01
Vol. E88-A  No. 2 ; pp. 568-574
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
key managementbroadcast encryptionstateless receiverstrapdoor permutationsclaw-free permutations
 Summary | Full Text:PDF(172KB)

Secure, Efficient and Practical Key Management Scheme in the Complete-Subtree Method
Ryo NOJIMA Yuichi KAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 189-194
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
key managementbroadcast encryptioncomplete subtree methodstateless receiverstrapdoor permutationsrandom oracle model
 Summary | Full Text:PDF(161.4KB)

Two Factor Authenticated Key Exchange (TAKE) Protocol in Public Wireless LANs
Young Man PARK Sang Kyu PARK 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2004/05/01
Vol. E87-B  No. 5 ; pp. 1382-1385
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
authenticationwireless securityEAP methodkey management802.11i
 Summary | Full Text:PDF(129.5KB)

A Flexible Tree-Based Key Management Framework
Natsume MATSUZAKI Toshihisa NAKANO Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1 ; pp. 129-135
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocols etc.
Keyword: 
key managementframeworktree-basedmultiple content distribution systems
 Summary | Full Text:PDF(227.8KB)

Cryptanalysis of a Key Management Scheme for Secure Multicast Communications
Gwoboa HORNG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2002/05/01
Vol. E85-B  No. 5 ; pp. 1050-1051
Type of Manuscript:  LETTER
Category: Internet
Keyword: 
multicast communicationskey managementcryptographyone-way function tree
 Summary | Full Text:PDF(102.1KB)

Development of Cryptology in the Nineties
Hideki IMAI Junji SHIKATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1 ; pp. 61-67
Type of Manuscript:  INVITED PAPER (Special Section on the 10th Anniversary of the IEICE Transactions of Fundamentals: "Last Decade and 21st Century")
Category: 
Keyword: 
cryptologysecret-key cryptographypublic-key cryptographykey managementhumancrypt
 Summary | Full Text:PDF(317.7KB)

Cryptographic Works of Dr. Kenji Koyama: In Memoria
Noboru KUNIHIRO Kazuo OHTA Tatsuaki OKAMOTO Routo TERADA Yukio TSURUOKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1 ; pp. 108-113
Type of Manuscript:  INVITED PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
modern cryptographykey managementzero-knowledge proofelliptic curve applications
 Summary | Full Text:PDF(216.8KB)

Extended Key Management System Using Complementary Exponential Calculation
Naoya TORII Takayuki HASEBE Ryota AKIYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1 ; pp. 78-87
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
key managementID-basedRSAcomplementary exponential calculation
 Summary | Full Text:PDF(763.9KB)