نتایج جستجو برای: random key distribution

تعداد نتایج: 1361267  

Journal: :I. J. Network Security 2005
Muhammad J. Bohio Ali Miri

In this paper we propose the self-healing feature for group key distribution through Subset Difference (SD) method proposed by D. Naor et al. The subset difference method is one of the efficient proposals for group key distribution, however, recently a polynomial based solution for key distribution was proposed by D. Liu et al., which has the similar message size but also provides self-healing ...

2003
Carlo Blundo Paolo D'Arco Massimiliano Listo

A self-healing key distribution scheme enables a group of users to establish a group key over an unreliable channel. In such a protocol, a group manager, to distribute a session key to each member of the group, broadcasts packets along the channel. If some packet gets lost, then users are still capable of recovering the group key using the received packets, without requesting additional transmi...

Journal: :Electr. Notes Theor. Comput. Sci. 2008
Keith M. Martin Maura B. Paterson

The term wireless sensor network is applied broadly to a range of significantly different networking environments. On the other hand there exists a substantial body of research on key establishment in wireless sensor networks, much of which does not pay heed to the variety of different application requirements. We set out a simple framework for classifying wireless sensor networks in terms of t...

2011
T. M Bhraguram S. Shermin

In this paper we proposed a new mutually authenticated method, ie Random Photon Key Pasting (RPKP) for secure data transmission which is already running under Quantum key distribution. RPKP is method which is trying to paste randomly generated number to the private key as log form and invoked from a trusted third party. The random numb will be completely based on the System level and it is high...

Journal: :TIIS 2008
Aziz Mohaisen DaeHun Nyang Tamer AbuHmed

In this paper, the random key pre-distribution scheme introduced in ACM CCS'02 by Eschenauer and Gligor is reexamined, and a generalized form of key establishment is introduced. As the communication overhead is one of the most critical constraints of any successful protocol design, we introduce an alternative scheme in which the connectivity is maintained at the same level as in the original wo...

2014
Sung-Woon Lee Hyunsung Kim

Wireless sensor networks (WSNs) are often deployed in potentially adverse or even hostile environment so that there are concerns on security issues in these WSNs. Sensor nodes with resource-constrained make security applications a challenging problem. Key agreement is a fundamental security service in WSNs, which enables sensor nodes to communicate securely with each other using cryptographic t...

Journal: :مهندسی صنایع 0
فریبرز جولای department of industrial engineering elmira gheisariha department of industrial engineering farnaz nojavan department of industrial engineering

in this paper, we develop an inventory model for perishable items with random lifetime in a two-echelon production-distribution system. there is a manufacturer at the first stage that produces its product with a constant rate. deterioration in this stage is modeled via a two-parameter weibull distribution. at the second stage, the retailer places the order and receives the product instantly. th...

Journal: :IEICE Transactions 2008
Jung Yeon Hwang Jongin Lim Dong Hoon Lee

Jeong et al. recently have proposed a strong ID-based key distribution scheme in order to achieve security against long-term key reveal and session state reveal attacks. In this letter, we show that, unfortunately, the ID-based key distribution scheme is vulnerable to an impersonation attack such that anyone can manipulate public transcripts generated by a user to impersonate the original user....

2017
Philip Chan Itzel Lucio-Martínez Xiaofan Mo Wolfgang Tittel

Journal: :Computer Standards & Interfaces 2005
Qiang Tang Chris J. Mitchell

In this paper we consider the security of two recently proposed anonymous conference key distribution schemes. We show that neither scheme is as practical as the authors claim and that, in certain circumstances, both schemes also suffer from security vulnerabilities. We also show that the attack described in one paper is invalid.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید