نتایج جستجو برای: key management

تعداد نتایج: 1347875  

1997
Jong-Hyeon Lee

Theworking group IPSEC of the Internet Engineering Task Force (IETF) is considering IP-layer key management standards. Currently several protocols have been suggested as candidates of the IP security key management standards. They are ISAKMP, Oakley, SKIP, and Photuris. SKEME is another suggestion for an IP-layer key exchange mechanism but is not a suggested Internet Draft. In this paper, we pr...

Journal: :international journal of management academy 0
usha thangamuthu department of bank management ethiraj college for women, chennai

commercial banks and financial institutions are recognizing that they can no longer look at a customer from a specific product but must encompass the entire customer relationship to fully understand a client‘s profitability. from a strategic standpoint, customer relationship management (crm) mobilizes resources around customer relationships rather than product groups and fosters activities that...

Journal: :IEEE Trans. Information Theory 2001
Radha Poovendran John S. Baras

Recent literature presents several rooted tree based member deletion/revocation schemes [20, 21, 22, 24, 4, 5] trying to simultaneously minimize the key storage while providing e cient member deletion/revocation. Many of these approaches have di erent solutions and provide di erent values for the number of keys to be stored and distributed. In this paper, we show that many of these papers can b...

Journal: :Electr. Notes Theor. Comput. Sci. 2005
Graham Steel Alan Bundy

This paper describes the modelling of a two multicast group key management protocols in a first-order inductive model, and the discovery of previously unknown attacks on them by the automated inductive counterexample finder CORAL. These kinds of protocols had not been analysed in a scenario with an active intruder before. CORAL proved to be a suitable tool for a job because, unlike most automat...

Journal: :EURASIP J. Wireless Comm. and Networking 2013
Samiran Bag Bimal K. Roy

Key predistribution for wireless sensor networks has been a challenging field of research because stringent resource constraints make the key predistribution schemes difficult to implement. Despite this, key predistribution scheme is regarded as the best option for key management in wireless sensor networks. Here, the authors have proposed a new key predistribution scheme. This scheme exhibits ...

Journal: :Wireless Personal Communications 2010
Ju-Hyung Son Jun-Sik Lee Seung-Woo Seo

A sensor network operating in open environments requires a network-wide group key for confidentiality of exchanged messages between sensor nodes. When a node behaves abnormally due to its malfunction or a compromise attack by adversaries, the central sink node should update the group key of other nodes. The major concern of this group key update procedure will be the multi-hop communication ove...

Journal: :IJDSN 2013
Gowun Jeong Yongho Seo Hyun Seung Yang

Key management in a large portion of ubiquitous sensor networks has been a challenge due to the limited capabilities of their wireless communicating and battery-powered sensors. Moreover, an attacker physically capturing even a few nodes hampers the entire network security by impersonating nodes to inject false data in an undetected manner. To efficiently protect from such impersonating by node...

2005
Min Yan

Our project will focus on real time system with constraints on security, real-time performance and limited resource. It is the seeking for performance optimization after a trade of all the constraints considered. Namely, we will cover the following areas: (a) Secure wireless communication in MANETs (b) Scalable and lightweight secure group communication, including authentication of group member...

2007
Syed Muhammad Khaliq-ur-Rahman Raazi Adil Mehmood Khan Faraz Idris Khan Sungyoung Lee Young Jae Song Young-Koo Lee

In many of the sensor network applications like natural habitat monitoring and international border monitoring, sensor networks are deployed in areas, where there is a high possibility of node capture and network level attacks. Specifically in such applications, the sensor nodes are severely limited in resources. We propose MUQAMI, a locally distributed key management scheme for resilience agai...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید