Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
A Secure Fault-Tolerant Conference-Key Agreement Protocol
IEEE Transactions on Computers
A Secure Audio Teleconference System
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
The Design of a Conference Key Distribution System
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
A novel conference key distribution system with re-keying protocol
HSI'05 Proceedings of the 3rd international conference on Human Society@Internet: web and Communication Technologies and Internet-Related Social Issues
Security analysis on a conference scheme for mobile communications
IEEE Transactions on Wireless Communications
Conference key distribution schemes for secure digital mobile communications
IEEE Journal on Selected Areas in Communications
Measuring and prioritising value of mobile phone usage
International Journal of Mobile Communications
A novel and low-computation e-cash transfer system against blackmail for mobile communications
International Journal of Mobile Communications
Hi-index | 0.00 |
A conference scheme enables a group of people to establish a common secret key to hold a secure conference. Recently, technological advances have allowed all conferees to hold a mobile conference via wireless communication. However, wireless communications are more susceptible to eavesdropping and unauthorised access than conversations via wires. Therefore, it is crucial to ensure confidentially and authenticity in mobile teleconferencing. Based on the Elliptic Curve Cryptography, this article proposes a new efficient conference scheme, which allows a participant to join or quit a teleconference dynamically. No trusted centre and no interactive protocol among participants are required to construct the common conference key for each session. It can save on communication overhead.