نتایج جستجو برای: pre distribution key

تعداد نتایج: 1409099  

1995
Kaoru KUROSAWA Koji OKADA Keiichi SAKANO

This paper studies the security of the trusted center in a b-secure t-group key distribution scheme in which the center issues a private information vi 2 V to each user i based on the center secret s 2 S. User i can obtain the common key k 2 K with t ? 1 other users from vi so that any dishonest b users cannot learn any key they should not know. First, we show how to distribute the power of the...

Ali Bozorgi‑Amiri Fariborz Jolai Iman Shokr Mansour Doodman

Humanitarian organizations pre-position relief items in pre-disaster and distribute them to the affected areas in post-disaster. Improper planning of emergency operations causes more deaths in post-disaster. In this paper, the problem of relief item pre-positioning and multi-period distribution planning is addressed considering lateral transhipment among distribution centres to improve the effi...

Journal: :journal of midwifery and reproductive health 0
زهرا زهرا عابدیان zahra abedian lecturer, department of midwifery, school of nursing and midwifery, mashhad university of medical sciences, mashhad, iran narges soltani gradate, msc in midwifery, school of nursing and midwifery, mashhad university of medical sciences, mashhad, iran naghmeh mokhber associate professor, psychiatry and behavioral sciences research center, department of psychiatry, school of medicine, mashhad university of medical sciences, mashhad, iran habibollah esmaeily assistant professor, department of biostatistics, school of health, mashhad university of medical sciences, mashhad, iran

background and aim: post-traumatic stress disorder is one of the anxiety disorders which occur in postpartum period. the prevalence of ptsd – induced by preeclampsia has been already reported as 28%, however no study was found to compare ptsd in primiparous and multiparous women. this study was therefore conducted to compare ptsd in primiparous and multiparous women. methods: this comparative d...

2012
RIZWAN BEG

Security is an indispensable concern in Wireless Sensor Network (WSN) due to the presence of potential adversaries. For secure communication in infrastructureless sensor nodes various key predistribution have been proposed. In this paper we have evaluated various existing deterministic, probabilistic and hybrid type of key pre-distribution and dynamic key generation algorithms for distributing ...

Journal: :TIIS 2009
Aziz Mohaisen Jeong Woon Choi Dowon Hong

In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly, the resulting key distribution construction should be symmetric and group-wise.

2000
Kuen-Pin Wu Shanq-Jang Ruan Feipei Lai Chih-Kuang Tseng

Multicasting has been widely utilized for delivering messages from one sender to multiple recipients. Nowadays in some applications such as pay per view or videoconferencing systems, the messages delivered via multicasting should be available to authorized recipients only. Therefore, secure multicasting becomes an important design issue in distributed environment. To achieve secure multicasting...

Journal: :Wireless Personal Communications 2015
Hua Guo Yandong Zheng

Recently, in Journal of Security and Communication Networks (5(12):1363-1374, DOI: 10.1002/ sec.429), Wang et al. proposed a group key distribution scheme with self-healing property for wireless networks in which resource is constrained. They claimed that their key distribution scheme satisfies forward security, backward security and can resist collusion attack. Unfortunately, we found some sec...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و زبانهای خارجی 1390

abstract the current study set out to address the issue as to whether the implementation of portfolio assessment would give rise to iranian pre-intermediate efl learner autonomy. participants comprised 60 female in pre-intermediate level within the age range of 16-28.they were selected from among 90 language learners based on their scores on language proficiency test -key english test. then, t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد - پژوهشکده ادبیات 1392

abstract the aim of the present study is to explore the impact of the cognitive reading strategy instruction on learners reading self-efficacy and their reading achievement. in order to fulfill this purpose, from 120 participants, 90 intermediate efl learners as an experimental group were chosen from three different educational settings namely, yazd university, yazd science and art un...

2006
Sinan Emre TAŞÇI

Sensor nodes are tiny, low-power and battery constrained electromechanical devices that are usually deployed for sensing some type of data in different types of areas. Because of their memory and computational restrictions, public key cryptography (PKC) systems are not suited for sensor nodes to provide security. Instead, private key cryptography is preferred to be used with sensor networks and...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید