نتایج جستجو برای: probabilistic key sharing

تعداد نتایج: 694661  

2010
Meng-Hsiun Tsai Shih-Shan Tang Chung-Ming Wang

Secure group communications are increasingly used in the continuous growth of the Internet applications. In a secure multicast environment, an identical data can be efficiently delivered from a source to multiple receivers within a dynamic group. A simple solution is to encrypt the transmitted data using a symmetric key. However, scalable group rekeying is the main challenge for large and dynam...

2015
Pratima Popat Gutal

A distributed key generation (DKG) protocol is a central segment in distributed cryptosystems. It permits a gathering of members to mutually produce a pair of keys (private key and public key) without assuming any trusted member. The public key is output in clear but only authorised subgroups of members are able to reconstruct or utilize the private key. Existing study on DKG protocols assumes ...

2012
Peng Xiao Jingsha He Yingfang Fu

Wireless mesh networks (WMNs) are wireless access networks based on IP technologies, which combine the advantages of WLANs and ad hoc networks and have thus become broadband access networks with high capacity, high speed and wide coverage. Due to the multi-hop characteristics of WMNs, security has become a critical issue in WMNs and a simple and effective distributed key management is essential...

Journal: :Int. Arab J. Inf. Technol. 2014
Kanokwan Kanyamee Chanboon Sathitwiriyawong

This paper proposes two versions for the implementation of a novel High-Availability Decentralized cryptographic Multi-agent Key Recovery System (HADM-KRS) that do not require a key recovery centre: HADM-KRSv1 and HADM-KRSv2. They have been enhanced from our previous work and entirely comply with the latest key recovery system in the National Institute of Standards and Technologies (NIST's) fra...

2011
Prabir Kr. Naskar Hari Narayan Khan Ayan Chaudhuri Atal Chaudhuri

Protection of sensitive data is an important issue, precisely during transmission over internet. Efficient cryptographic methods are there to protect data but everything depends on the protection of the encryption key. Threshold cryptography enables the construction of reliable and robust key management system which can reconstruct the key even in the destroy of some shares and on the contrary ...

Journal: :IET Information Security 2015
Nasrollah Pakniat Mahnaz Noroozi Ziba Eslami

A distributed key generation (DKG) protocol is a central component in distributed cryptosystems. It allows a group of participants to jointly generate a pair of keys (private key and public key) without assuming any trusted participant. The public key is output in clear but only authorised subgroups of participants are able to reconstruct or use the private key. Existing literature on DKG proto...

Arman Ahmadizad, Maryam Varmaghani Shilan Ahmadyari

In today's competitive world corporate survival requires special attention to innovation. Given the key role of intellectual capital in corporate innovation capability, this article is written with the aim of provide a model to promote organizational innovation through human capital management and knowledge sharing. The population in this study is managers, directors and experts from 13 industr...

Arman Ahmadizad, Maryam Varmaghani Shilan Ahmadyari

In today's competitive world corporate survival requires special attention to innovation. Given the key role of intellectual capital in corporate innovation capability, this article is written with the aim of provide a model to promote organizational innovation through human capital management and knowledge sharing. The population in this study is managers, directors and experts from 13 industr...

The main purpose of this study is to investigate the effect of human resources information systems on knowledge sharing through the mediation of organizational culture in Branches of Mellat Bank in Shiraz city. In this study, the key indicators for each variable of the study (human resources information systems, knowledge sharing and knowledge-based organizational culture) was given. then, they...

2001
Beverly Yang Hector Garcia-Molina

“Peer-to-peer” systems like Napster and Gnutella have recently become popular for sharing information. In this paper, we study the relevant issues and tradeoffs in designing a scalable P2P system. We focus on a subset of P2P systems, known as “hybrid” P2P, where some functionality is still centralized. (In Napster, for example, indexing is centralized, and file exchange is distributed.) We mode...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید