نتایج جستجو برای: key management system

تعداد نتایج: 3273501  

Journal: :IACR Cryptology ePrint Archive 2003
Yevgeniy Dodis Michael J. Freedman Shabsi Walfish

We present a new, elegant composition method for joint signature and encryption, also referred to assigncryption. The new method, which we call Padding-based Parallel Signcryption (PbPS), builds an effi-cient signcryption scheme from any family of trapdoor permutations, such as RSA. Each user U generates asingle public/secret key pair fU/f −1Uused for both sending and receiv...

2003
Gaurav Jolly Mustafa C. Kusçu Pallavi Kokate Mohamed F. Younis

*Abstract. Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critically important. Moreover, limited energy, computing, and memory resources prohibit the use of complex security mechanisms within sensor networks. Therefore, well balancing between security level and the assoc...

2004
Janko Calic Neill W. Campbell Majid Mirmehdi Barry T. Thomas Ron Laborde Sarah V. Porter Cedric Nishan Canagarajah

This paper presents a system designed for the management of multimedia databases that embarks upon the problem of efficient media processing and representation for automatic semantic classification and modelling. Its objectives are founded on the integration of a large-scale wildlife digital media archive with a manually annotated semantic metadata organised in a structured taxonomy and media c...

2012
Deepali Jain S. Rafaeli D. Hutchison R. K. Balachandran J. H. Cho I. R. Chen D. C. Wang

A mobile ad hoc network is an autonomous system of mobile nodes connected by wireless links. The nodes are free to move about and organize themselves into a network. For many application of MANET we need to establish secure group communication between members of groups. Some of the protocols to generate group key have been surveyed, and then their comparison is given based on the fact that if w...

Journal: :IJCSA 2009
Xianping Wu Huy Hoang Ngo Phu Dung Le Balasubramaniam Srinivasan

This paper presents a secure authentication and authorization management mechanism for protecting privacy in sensitive information systems. It allows involved individuals and group participants to achieve high security levels and tight authorization control. The need of sharing long term secrets to authenticate individuals and group users is eradicated in the proposed protocol by dynamic keys. ...

Journal: :international journal of environmental research 0

processing and recovery is a key functional element in municipal solid waste management system (mswms). reuse, recycle and recovery of valuable components of waste stream are given much attention in mswms in both developed and developing countries. the main concern of municipalities is the sound management of recyclable materials. source separation as a best practice for management of trash and...

Early warning systems are key components of strategies to reduce risk. This research, by adopting a systematic approach in the management of the risk of desertification and by including previously developed models and systems, offers an integrated efficient structure in terms of early warning for the risk of desertification as a pilot system for semi-arid areas of west Golestan Province in IRAN...

2000
Audun Jøsang Ingar Glenn Pedersen Dean Povey

All human co-operation is based on trust, meaning that we choose co-operation partners and make commitment decisions based on how much we trust the other party. Digital certificates and public-key infrastructures represent an attempt to mimic real-world human assessment of identity and trustworthiness in an automated and mechanical fashion, but present implementations are based on a very limite...

Journal: :Int. Arab J. Inf. Technol. 2014
Kanokwan Kanyamee Chanboon Sathitwiriyawong

This paper proposes two versions for the implementation of a novel High-Availability Decentralized cryptographic Multi-agent Key Recovery System (HADM-KRS) that do not require a key recovery centre: HADM-KRSv1 and HADM-KRSv2. They have been enhanced from our previous work and entirely comply with the latest key recovery system in the National Institute of Standards and Technologies (NIST's) fra...

Journal: :IACR Cryptology ePrint Archive 2011
Shaohua Tang Jintai Ding Zhiming Yang

Secure group communication systems become more and more important in many emerging network applications. For a secure group communication system, an efficient and robust group key management approach is essential. In this paper, a new group key management approach with a group controller GC using the theory of hyper-sphere is developed, where a hyper-sphere is constructed for the group and each...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید