نتایج جستجو برای: key group method

تعداد نتایج: 2918918  

2011
Mourad Amad Djamil Aïssani Ahmed Meddahi Mustapha Saadi

Secure and efficient communication among a set of mobile nodes is one of the most important aspect in P2P wireless networks. Security of various group-oriented applications requires a group secret shared between all participants. Several group key protocols have been presented in the literature to enable secrecy of communication among dynamic group of participants. However, most of them suffer ...

2005
Min Yan

Our project will focus on real time system with constraints on security, real-time performance and limited resource. It is the seeking for performance optimization after a trade of all the constraints considered. Namely, we will cover the following areas: (a) Secure wireless communication in MANETs (b) Scalable and lightweight secure group communication, including authentication of group member...

Journal: :JNW 2009
Shuhua Wu Yuefei Zhu

This paper presents an efficient solution to key exchange problem for large groups in the password-based scenario. Our scheme can combine existing group protocols to get a hybrid group key exchange protocol which is efficient in terms of both computation and communication. And the resulting protocol allows users to securely join and leave the group at any time—the so-called dynamic case. For dy...

2001
Ghassan Chaddoud Isabelle Chrisment André Schaff

I f multicast communication appears as the most eficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as authentication, integrity and confidentiality to transport data securely. In this papel; we present the protocol Baal’ as a scalable solution to group key inanagement problems and show how Baal resolves the user’s re...

Journal: :Pervasive and Mobile Computing 2007
Daniel Augot Raghav Bhaskar Valérie Issarny Daniele Sacchetti

Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one’s contribution over a public network without any central authority. They also provide efficient ways to change the key when the participants change. While some of the proposed GKA protocols are too resource consuming for the constraint devices often present in ad hoc networks, others lack a formal secu...

2009
Yanjiang Yang Jianying Zhou Robert H. Deng Feng Bao

Self-healing group key distribution aims to achieve robust key distribution over lossy channels in wireless sensor networks (WSNs). However, all existing self-healing group key distribution schemes in the literature consider homogenous WSNs which are known to be unscalable. Heterogeneous WSNs have better scalability and performance than homogenous ones. We are thus motivated to study hierarchia...

2012
Wei Yuan Liang Hu Hongtu Li Jianfeng Chu

In this paper, a novel and efficent password based group key exchange protocol with secret sharing is proposed. Secret sharing technology is usually used to control the privileges of the authorized users to improve the robustness of the system in past years. The results are applied into designing the key exchange protocol directly, which clarify the proposed scheme. The security analysis shows ...

2012
Kashi Neupane Rainer Steinwandt Adriana Suárez Corona

The popular Katz-Yung compiler from CRYPTO 2003 can be used to transform unauthenticated group key establishment protocols into authenticated ones. In this paper we present a modification of Katz and Yung’s construction which maintains the round complexity of their compiler, but for ‘typical’ unauthenticated group key establishments adds authentication in such a way that deniability is achieved...

Journal: :IJSN 2009
Bing Wu Jie Wu Yuhong Dong

Group key management is one of the basic building blocks in collaborative and group-orientedapplications inMobileAdHocNetworks (MANETs).Groupkey establishment involves creating and distributing a common secret for all group members. However, key management for a large and dynamic group is a difficult problem because of scalability and security.Modification ofmembership requires the groupkey to ...

Journal: :Journal of Computer Security 2006
Olivier Pereira Jean-Jacques Quisquater

The A-GDH.2 and SA-GDH.2 authenticated group key agreement protocols showed to be flawed in 2001. Even though the corresponding attacks (or some variants of them) have been rediscovered in several different frameworks, no fixed version of these protocols has been proposed until now. In this paper, we prove that it is in fact impossible to design a scalable authenticated group key agreement prot...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید