186
Views
5
CrossRef citations to date
0
Altmetric
Section A

Mathematical analysis and simulation of multiple keys and S-Boxes in a multinode network for secure transmission

, &
Pages 2123-2142 | Received 15 Sep 2010, Accepted 13 Jun 2012, Published online: 03 Aug 2012

References

  • Aiello , W. and Venkatesan , R. 1996 . “ Foiling birthday attacks in length-doubling transformations ” . In Advances in Cryptology – EUROCRYPT ’96 , Edited by: Maurer , U. Vol. 1070 , 307 – 320 . Berlin : Springer-Verlag . Lecture Notes in Computer Science
  • Backes , M. and Pfitzmann , B. 2005 . Relating symbolic and cryptographic secrecy . IEEE Trans. Dependable Secure Comput. , 2 ( 2 ) : 109 – 123 . (doi:10.1109/TDSC.2005.25)
  • Banerjee , A. , Drake , L. , Lang , L. , Turner , B. , Awduche , D. , Berger , L. , Kompella , K. and Rekhter , Y. 2001 . Generalized multiprotocol label switching: An overview of signaling enhancements and recovery techniques . IEEE Commun. Mag. , 39 ( 7 ) : 144 – 151 . (doi:10.1109/35.933450)
  • Bertino , E. , Shang , N. and Wagstaff , S. S. Jr. 2008 . An efficient time-bound hierarchical key management scheme for secure broadcasting . IEEE Trans. Dependable Secure Comput. , 5 ( 3 ) : 65 – 70 . (doi:10.1109/TDSC.2007.70241)
  • Blake , I. F. and Kolesnikov , V. Strong conditional oblivious transfer and computing on intervals . Proceedings of Advances in Cryptology – ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security . December 5–9 2004 , Jeju Island , Korea. pp. 515 – 529 . Heidelberg , , Germany Lecture Notes in Computer Science Vol. 3329, Springer-Verlag, Berlin
  • Blake , I. F. and Kolesnikov , V. Conditional encrypted mapping and comparing encrypted numbers . Proceedings of the 10th International conference on Financial Cryptography and Data Security . pp. 206 – 220 . Berlin, Heidelberg : Springer-Verlag .
  • Bobbio , A. and Trivedi , K. S. 1990 . Computing cumulative measures of stiff Markov chains using aggregation . IEEE Trans. Comput. , 39 ( 10 ) : 1291 – 1297 . (doi:10.1109/12.59859)
  • Chan , H. , Perrig , A. and Song , D. Random key predistribution schemes for sensor networks . Proceedings of IEEE Symposium on Security and Privacy (S & P ’03), IEEE Computer Society . pp. 197 – 213 . Washington , , DC, USA
  • Ciardo , G. , Marmorstein , R. and Siminiceanu , R. Saturation unbound . Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems . pp. 379 – 393 . Berlin, Heidelberg : Springer-Verlag .
  • Du , W. , Deng , J. , Han , Y. S. , Varshney , P. K. , Katz , J. and Khalili , A. A pairwise key predistribution scheme for wireless sensor networks . Proceedings of the 10th ACM conference on Computer and communications security (CCS’03) . pp. 42 – 51 . New York , , NY, USA : ACM .
  • Eschenauer , L. and Gligor , V. D. A key-management scheme for distributed sensor networks . Proceedings of the 9th ACM conference on Computer and communications security (CCS’02) . pp. 41 – 47 . New York , , NY, USA : ACM .
  • Fischlin , M. A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires . Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA . pp. 457 – 472 . London , , UK : Springer-Verlag .
  • Fu , Z. , Luo , H. , Zerfos , P. , Lu , S. and Zhang , L. 2005 . The impact of Multihop wireless channel on TCP performance . IEEE Trans. Mobile Comput. , 4 ( 2 ) : 209 – 221 . (doi:10.1109/TMC.2005.30)
  • Halkidis , S. T. , Tsantalis , N. , Chatzigeorgiou , A. and Stephanides , G. 2008 . Architectural risk analysis of software systems based on security patterns . IEEE Trans. Dependable Secure Comput. , 5 ( 3 ) : 129 – 142 . (doi:10.1109/TDSC.2007.70240)
  • He , X. , Zhang , M. and Yang , Q. K. 2005 . SPEK: A storage performance evaluation kernel module for block-level storage systems under faulty conditions . IEEE Trans. Dependable Secure Comput. , 2 ( 2 ) : 138 – 149 . (doi:10.1109/TDSC.2005.27)
  • Hundessa , L. Optimal and guaranteed alternative LSP for multiple failures . Proceedings of 13th International Conference on Computer Communications and Networks, IEEE Conference . pp. 59 – 64 . Chicago : Illinois .
  • Lee , S. K. , Kim , C. and Griffith , D. Hierarchical Restoration Scheme for Multiple Failures in GMPLS Networks . Proceedings of International Conference on Parallel Processing Workshops (ICPPW’02), IEEE Computer Society . pp. 177 – 182 . Vancouver, BC , , Canada
  • Liu , D. and Ning , P. Establishing pairwise keys in distributed sensor networks . Proceedings of the 10th ACM conference on Computer and communications security (CCS’03) , pp. 52 – 61 . New York , , NY, USA : ACM .
  • Livshits , V. B. and Lam , M. S. Finding security vulnerabilities in java applications with static analysis . Proceedings of the 14th conference on USENIX Security Symposium (SSYM’05) . pp. 19 – 36 . Berkeley , , CA, USA : USENIX Association .
  • Madan , B. B. , Goseva-Popstojanova , K. , Vaidyanathan , K. and Trivedi , K. S. 2004 . A method for modeling and quantifying the security attributes of intrusion tolerant systems . Perform. Eval. , 56 ( 1 ) : 167 – 186 . (doi:10.1016/j.peva.2003.07.008)
  • Muppala , J. , Malhotra , M. and Trivedi , K. 1994 . Stiffness-tolerant methods for transient analysis of stiff Markov chains . Microelectronics Reliab. , 34 ( 11 ) : 1825 – 1841 . (doi:10.1016/0026-2714(94)90137-6)
  • Naor , M. , Pinkas , B. and Sumner , R. 1999 . Privacy preserving auctions and mechanism design, EC’99 , 129 – 139 . New York : ACM Press .
  • Paillier , P. Public-key cryptosystems based on composite degree residuosity classes . Proceedings of the 17th International conference on Theory and application of cryptographic techniques . pp. 223 – 238 . Berlin, Heidelberg : Springer-Verlag .
  • Papadimitratos , P. and Haas , Z. J. 2003 . Secure message transmission in mobile ad hoc networks . Ad Hoc Networks , 1 ( 1 ) : 193 – 209 . (doi:10.1016/S1570-8705(03)00018-0)
  • Park , J. T. , Nah , J. W. and Lee , W. H. 2008 . Dynamic path management with resilience constraints under multiple link failures in MPLS/GMPLS networks . IEEE Trans. Dependable Secure Comput. , 5 ( 3 ) : 143 – 154 . (doi:10.1109/TDSC.2008.16)
  • Reibman , A. and Trivedi , K. S. 1988 . Numerical transient analysis of Markov models . Comput. Oper. Res. , 15 ( 1 ) : 19 – 36 . (doi:10.1016/0305-0548(88)90026-3)
  • Ren , J. and Harn , L. 2008 . Generalized ring signatures . IEEE Trans. Dependable Secure Comput. , 5 ( 3 ) : 153 – 164 . (doi:10.1109/TDSC.2008.22)

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.