نتایج جستجو برای: key

تعداد نتایج: 553708  

2012
E. MOHANRAJ

QoS is the presentation level of service presented by a network to the user. The objective of QoS is to accomplish more deterministic system activities so that the information conceded by the network can be better conveyed and the resources can be better employed. QoS routing and security is the process of offering continuous free paths to guarantee the required QoS parameters. The security of ...

2017
Bin Yang Jianfeng Zhang

Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation secur...

Journal: :IACR Cryptology ePrint Archive 2008
Chunbo Ma Jun Ao

Many practical applications use hybrid encryption mechanism to deal with large plaintext messages or real-time communication since the performance of the public key encryption scheme is poor. The key encapsulation is a crucial part in hybrid encryption mechanism, which allows a sender to generate a random session key and distribute it to recipient. In this paper we present a proxy key re-encaps...

Journal: :CoRR 2016
Somayeh Salimi Matthieu R. Bloch Frederic Gabry Mikael Skoglund Panagiotis Papadimitratos

This paper considers the problem of pairwise key agreement without public communication between three users connected through a generalized multiple access channel (MAC). While two users control the channel inputs, all three users observe noisy outputs from the channel and each pair of users wishes to agree on a secret key hidden from the remaining user. We first develop a “pre-generated” key-a...

Journal: :Adv. in Math. of Comm. 2015
Yang Lu Quanling Zhang Jiguo Li

Exposure of secret keys may be the most devastating attack on a public key cryptographic scheme since such that security is entirely lost. The key-insulated security provides a promising approach to deal with this threat since it can effectively mitigate the damage caused by the secret key exposure. To eliminate the cumbersome certificate management in traditional PKIsupported key-insulated sig...

2004
Junghyun Nam Seungjoo Kim Dongho Won

In this paper, we show that Bresson-Chevassut-Essiari-Pointcheval’s group key agreement scheme does not meet the main security properties: implicit key authentication, forward secrecy, and known key security. Also, we propose an improved version which fixes the security flaws found in the scheme.

2006
Man Ho Au Jing Chen Joseph K. Liu Yi Mu Duncan S. Wong Guomin Yang

Identity-based cryptosystems have an inherent key escrow issue, that is, the Key Generation Center (KGC) always knows user secret key. Thus, if the KGC is malicious, it can always impersonate the user. Certificateless cryptography, introduced by Al-Riyami and Paterson in 2003, is intended to solve this problem. However, in all the previously proposed certificateless schemes, it is always assume...

Journal: :CoRR 2011
Rohith Singi Reddy

Key establishment between any pair of nodes is an essential requirement for providing secure services in wireless sensor networks. Blom’s scheme is a prominent key management scheme but its shortcomings include large computation overhead and memory cost. We propose a new scheme in this paper that modifies Blom’s scheme in a manner that reduces memory and computation costs. This paper also provi...

Journal: :I. J. Network Security 2017
Qianying Zhang Zhiping Shi

UKS (unknown key-share) attacks are common attacks on AKE (Authenticated Key Exchange) protocols. We summarize two common countermeasures against UKS attacks on a kind of AKE protocols whose message flows are basic Diffie-Hellman exchanges. The first countermeasure forces the CA to check the possession of private key during registration, which is impractical for the CA. The second countermeasur...

Journal: :Inf. Sci. 2007
Hsing-Chung Chen Shiuh-Jeng Wang Jyh-Horng Wen

In this paper, a packet construction mechanism using an ID-based factorial number structure (ID-based FNS) is proposed for a secure conference call system in an ad hoc network. We adopt the ID-based concept for a conference key generation in which each participant with one’s own public identity uses a pre-chosen secret-key to generate the exchange conference key for the conference call. Further...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید