The Design of Security Protocol for An Efficient Distribution and Renewal Method of Group Key
نویسندگان
چکیده
منابع مشابه
nano-rods zno as an efficient catalyst for the synthesis of chromene phosphonates, direct amidation and formylation of amines
چکیده ندارد.
investigating the feasibility of a proposed model for geometric design of deployable arch structures
deployable scissor type structures are composed of the so-called scissor-like elements (sles), which are connected to each other at an intermediate point through a pivotal connection and allow them to be folded into a compact bundle for storage or transport. several sles are connected to each other in order to form units with regular polygonal plan views. the sides and radii of the polygons are...
development and implementation of an optimized control strategy for induction machine in an electric vehicle
in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...
15 صفحه اولELK, A New Protocol for Efficient Large-Group Key Distribution
Secure media broadcast over the Internet poses unique security challenges. One problem access control to a large number of subscribers in a public broadcast. A common solution is to encrypt the broadcast data and to disclose the decryption key to legitimate receivers only. However, how do we securely and efficiently establish a shared secret among the legitimate receivers? And most importantly,...
متن کاملAn Efficient Rekeying Function Protocol with Multicast Key Distribution for Group Key Management in MANETs
Key management in the ad hoc network is a challenging issue concerning the security of the group communication. Group key management protocols can be approximately categorized into three: centralized, decentralized, and distributed. The much apt solution to provide the services like authentication, data integrity and data confidentiality is the establishment of a key management protocol. This p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The KIPS Transactions:PartC
سال: 2002
ISSN: 1598-2858
DOI: 10.3745/kipstc.2002.9c.3.331