نتایج جستجو برای: key group method

تعداد نتایج: 2918918  

2005
Ersin Uzun

In this paper, we give a brief overview of several recent proposals that address the problem of group key distribution in secure multicasting over mobile ad hoc networks. We discuss the requirements and challenges raised from multicast in ad hoc networks in general and group key distribution over mobile ad hoc networks in particular. We also give the analysis of each proposal in terms of effici...

2017
Nikita Gupta Amit Saxena Maithili Narasimha Randy Katz Lifeng Lai Siu-Wai Ho

Here in this paper a new and efficient technique for the Cohort of Keys using Tree based Algorithm is proposed for the Sharing of Data in Secure manner. The Key Group Procedure is implemented for the Sharing of Data where Data Owner who needs to send Data is first Encrypted Information using Tree grounded Key Group and then when Data is received at the other end it is decrypted and Classify as ...

2001
Huaxiong Wang

Multicast communication is the main mode of communication for a wide range of Internet services such as video broadcasting and multi-party teleconferencing where there are multiple recipients. A secure multicast system allows a group initiator (or a centre) to send message over a multicast channel to a dynamically changing group of users. The main challenge in secure multicasting is efficient g...

2005
Qiang Tang Chris J. Mitchell

In this paper we analyse the security of two authenticated group key agreement schemes based on the group key agreement protocol of Burmester and Desmedt. One scheme was proposed by Burmester and Desmedt, and uses a separate authentication scheme to achieve authentication among the participants. We show that this scheme suffers from a number of security vulnerabilities. The other scheme was gen...

Journal: :Future Internet 2022

In smart grids, the access verification of a large number intelligent gateways and terminal devices has become one main concerns to ensure system security. This means that grids need new key management method is safe efficient low computational cost. Although scholars have conducted relevant research, most these schemes cannot balance overhead Therefore, we propose lightweight secure method, ha...

Journal: :The International Conference on Electrical Engineering 2006

Journal: :International Journal of Advanced Computer Science and Applications 2011

Journal: :Journal of Discrete Mathematical Sciences and Cryptography 2021

Journal: :TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید