نتایج جستجو برای: group key

تعداد نتایج: 1484350  

Journal: :The International Conference on Electrical Engineering 2006

Journal: :International Journal of Advanced Computer Science and Applications 2011

Journal: :Journal of Discrete Mathematical Sciences and Cryptography 2021

Journal: :TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 2017

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران 1387

vocabulary as a major component of language learning has been the object of numerous studies each of which has its own contribution to the field. finding the best way of learning the words deeply and extensively is the common objective of most of those studies. however, one effective way for achieving this goal is somehow neglected in the field. using a variety of activities such as games can r...

2010
Lei Zhang Qianhong Wu Bo Qin Josep Domingo-Ferrer

In identity-based public-key cryptography, an entity’s public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key cryptography eliminates the need for certificates and solves certain public key management problems in traditional public-key cryptosystems. Recently, the notion of asymmetric group key agreement was introduced, in which the...

Journal: :I. J. Network Security 2008
Said Gharout Yacine Challal Abdelmadjid Bouabdallah

In the last few years, multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. Some multicast applications require confidentiality for transmitted data. So, a traffic encryption key is used to assure this confidentiality and has to be changed and distributed to all valid members whenever a membership change (join or leave) occur...

2002
Bin Sun Wade Trappe Yan Sun K. J. Ray Liu

Group-oriented services are attractive to both customers and service providers since they allow for potential markets that exploit user collaboration and shared experiences. In order to protect the content of a group service, the content must be encrypted using a key shared by group members. With the advancement of network technologies, customers will access group services from different networ...

Journal: :CoRR 2016
Vinod Kumar S. K. Pandey Rajendra Kumar

In the secure group communication, data is transmitted in such a way that only the group members are able to receive the messages. The main problem in the solution using symmetric key is heavy re-keying cost. To reduce re-keying cost tree based architecture is used. But it requires extra overhead to balance the keytree in order to achieve logarithmic re-keying cost. The main challenging issue i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید