نتایج جستجو برای: key management

تعداد نتایج: 1347875  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه الزهراء - دانشکده ادبیات، زبانهای خارجی و تاریخ 1391

the aim of conducting this study was to investigate the foreign language learning needs of undergraduate economics students and business management students in faculties of social sciences of alzahra and azad naragh university. in the study, which was designed on the basis of a qualitative-quantitative basis using interviews and questionnaires, 146 female undergraduate business management as we...

2003
Linda Morales Ivan Hal Sudborough Mohamed Eltoweissy Mohammad Hossain Heydari

There are numerous applications that require secure group communication. Much recent attention has been focused on secure multicasting over the Internet. When such systems are required to manage large groups which undergo frequent fluctuations in group membership, the need for efficient encryption key management becomes critical. This paper presents a combinatorial formulation of the multicast ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم پزشکی 1389

introduction: diabetes mellitus is an growing national and international public health concern. the number of people affected by diabetes in world by 2030 will be 69% in developing countries. regular physical activity plays a key role in the management of type 2 diabetes melitus, particularly glycemic control. it has been recommended that peoples with type 2 diabetes participate in moderate-int...

2001
Ghassan Chaddoud Isabelle Chrisment André Schaff

I f multicast communication appears as the most eficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as authentication, integrity and confidentiality to transport data securely. In this papel; we present the protocol Baal’ as a scalable solution to group key inanagement problems and show how Baal resolves the user’s re...

2010
Avinash Kumar Chaurasia R. K. Ghosh

In this paper we propose a light-weight random key pre-distributed scheme based on deployment knowledge. It uses only one hop for key distribution. It leads to a substantial reduction in energy requirement while improving key sharing and resilience factor compared to the scheme proposed in [1]. We develop the theoretical background of the proposed scheme and explain why the proposed scheme perf...

2004
Alexander Wiesmaier Marcus Lippert Evangelos G. Karatsiolis

We model a private key’s life cycle as a finite state machine. The states are the key’s phases of life and the transition functions describe tasks to be done with the key. Based on this we define and describe the key authority, a trust center module, which potentiates the easy enforcement of secure management of private keys in hierarchical public key infrastructures. This is done by assembling...

Journal: :I. J. Network Security 2011
Shiang-Feng Tzeng Cheng-Chi Lee Tzu-Chun Lin

Shen and Chen proposed a novel key management scheme for dynamic access control in a hierarchy. In this article, the authors shall present an improved version of Shen and Chen’s scheme to reduce the computational time required for key generation and derivation.

2004
Sandeep S. Kulkarni Bezawada Bruhadeshwar

We focus on the problem of distributing key updates in secure dynamic groups. Due to changes in group membership, the group controller needs to change and distribute the keys used for ensuring encryption. However, in the current key management algorithms the group controller broadcasts these key updates even if only a subset of users need them. In this paper, we describe a key distribution algo...

Journal: :IJSN 2009
Bing Wu Jie Wu Yuhong Dong

Group key management is one of the basic building blocks in collaborative and group-orientedapplications inMobileAdHocNetworks (MANETs).Groupkey establishment involves creating and distributing a common secret for all group members. However, key management for a large and dynamic group is a difficult problem because of scalability and security.Modification ofmembership requires the groupkey to ...

2007
Jukka Valkonen

Key management is crucial part of security in communications. In wireless ad-hoc network, the issue is even bigger. As there is no infrastructure in the network, the distribution of encryption keys in an authenticated manner is a difficult task. In this paper, key management aspects are discussed by first describing different key management approaches followed by some ways to authenticate key e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید