نتایج جستجو برای: key management

تعداد نتایج: 1347875  

2016
Johanna Sepulveda Daniel Flórez Vincent Immler Guy Gogniat Georg Sigl

Group keys can be used in order to communicate secretly sensitive data among IP cores. However, the flexibility and dynamic nature of MPSoCs force reshaping the security zones at runtime. Members of a zone must be able to efficiently compute the new group key while former members must be prevented for data disclosure. Efficiently creating security zones for achieving sensitive traffic isolation...

Journal: :Computers & Security 2012
Cristina Alcaraz Javier López Rodrigo Roman Hsiao-Hwa Chen

Key management in wireless sensor networks (WSN) is an active research topic. Due to the large number of key management schemes (KMS) proposed in the literature, it is not easy for a sensor network designer to know exactly which KMS best fits in a particular WSN application. In this article, we offer a comprehensive review on how the application requirements and the properties of various key ma...

Journal: :IACR Cryptology ePrint Archive 2007
Mikhail J. Atallah Marina Blanton Keith B. Frikken

The problem of key management in access hierarchies is how to assign keys to users and classes such that each user, after receiving her secret key(s), is able to independently compute access keys for (and thus obtain access to) the resources at her class and all descendant classes in the hierarchy. If user privileges additionally are time-based (which is likely to be the case for all of the app...

2005
Hoon Wei Lim Matthew J. B. Robshaw

This paper introduces the concept of a dynamic key infrastructure for Grid. It utilises the properties of Identity-based Cryptography (IBC) to simplify key management techniques used in current Public Key Infrastructure (PKI) settings for Grid. This approach can offer greater simplicity, flexibility, and enhanced computation trade-offs.

Journal: :Ad Hoc Networks 2013
Luca Veltri Simone Cirani Stefano Busanelli Gianluigi Ferrari

1570-8705/$ see front matter 2013 Elsevier B.V. All rights reserved. http://dx.doi.org/10.1016/j.adhoc.2013.05.009 ⇑ Corresponding author. E-mail addresses: [email protected] (L. Veltri), simone.cirani@unipr. it (S. Cirani), [email protected] (S. Busanelli), gianluigi. [email protected] (G. Ferrari). 1 Iolus [6] for example, is a scheme that interferes with the packet stream, si...

2009
Hao Wang QiuLiang Xu Xiu Fu

We present a new two-party attribute-based key agreement protocol that is secure without the random oracle model in groups equipped with a bilinear map. The attribute-based key agreement scheme is one type of the identity-based key agreement scheme, in which the identity can be viewed as a set of descriptive attributes. These kinds of schemes provide some new properties, such as hiding the iden...

2010
Yan Sun Wade Trappe

This book gives an introduction to group key management protocols in different network settings. It can be recommended to early researchers in the areas of group key management, secure multicast and secure communication in sensor networks. The book discusses various security issues in group communications in a network-aware approach. However, it fails to show how to rigorously analyze group key...

Journal: :I. J. Network Security 2008
Mohamed Salah Bouassida Isabelle Chrisment Olivier Festor

Specific applications like military or public emergency ones require secure group communication in ad hoc environments. The most suitable solution to provide the expected level of security to these services is the provision of a key management protocol. This paper shows the specific challenges towards key management protocols for securing multicast communications in ad hoc networks, and provide...

2006
Jelena Mǐsić

In this Chapter, we analyze performance of the 802.15.4 cluster in beacon enabled mode under the presence of key exchange protocol. We assume that all nodes are applying power management technique based on the constant event sensing reliability required by the coordinator. Power management generates random sleep times by every node which in average fairly distributes the sensing load among the ...

2003
P. Nikander J. Kempf

The existing IETF standards specify that IPv6 Neighbor Discovery and Address Autoconfiguration mechanisms MAY be protected with IPsec AH. However, the current specifications limit the security solutions to manual keying due to practical problems faced with automatic key management. This document specifies three different trust models and discusses the threats pertinent to IPv6 Neighbor Discover...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید