نتایج جستجو برای: key group method
تعداد نتایج: 2918918 فیلتر نتایج به سال:
although many scholars have proposed all kinds of key successful factors (ksfs) for erp activity to smoothly enhance the implementation of erp, the ksfs are based too much on concept and protocol cannot help an enterprise to achieve this objective. therefore, this research through qualitative interview method, integrating the ksfs and dynamic capability to set up a model so as to exhibit the ki...
abstract the structural and electrostatic properties of the single-walled two representative (8, 0) zigzag and (4, 4) armchair models of pristine and gaas-doped on boron phosphide nanotubes (bpnts) was investigated by calculating the nuclear magnetic resonance tensors and with performing the density function theory. the geometrical structures of all representative pristine and gaas-doped models...
In identity-based public-key cryptography, an entity’s public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key cryptography eliminates the need for certificates and solves certain public key management problems in traditional public-key cryptosystems. Recently, the notion of asymmetric group key agreement was introduced, in which the...
In the last few years, multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. Some multicast applications require confidentiality for transmitted data. So, a traffic encryption key is used to assure this confidentiality and has to be changed and distributed to all valid members whenever a membership change (join or leave) occur...
Group-oriented services are attractive to both customers and service providers since they allow for potential markets that exploit user collaboration and shared experiences. In order to protect the content of a group service, the content must be encrypted using a key shared by group members. With the advancement of network technologies, customers will access group services from different networ...
In the secure group communication, data is transmitted in such a way that only the group members are able to receive the messages. The main problem in the solution using symmetric key is heavy re-keying cost. To reduce re-keying cost tree based architecture is used. But it requires extra overhead to balance the keytree in order to achieve logarithmic re-keying cost. The main challenging issue i...
Many emerging group oriented and collaborative applications such as audio/video conferences use the peer-to-peer paradigm. Confidentiality is an often demanded feature for such applications, e.g. in business meetings, to provide group privacy. To assure confidentiality in a meeting the partners have to agree upon a common secret key for encrypting their communication. This requires efficient di...
Protocols for group key exchange are cryptographic algorithms that describe how a group of parties communicating over a public network can come up with a common secret key. Due to their critical role in building secure multicast channels, a number of group key exchange protocols have been proposed over the years for a variety of settings. In this work, we present a new protocol for password-aut...
Group key management presents a fundamental challenge in secure dynamic group communications. In this paper, we propose an efficient group authenticated key agreement protocol (EGAKA), which is designed to be fully distributed and fault-tolerant, provides efficient dynamic group membership management, mutual authentication among group members and is secure against both passive and active attack...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید