نتایج جستجو برای: broadcast authentication

تعداد نتایج: 63999  

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

Journal: :IEEE Internet of Things Journal 2022

Specific emitter identification (SEI) is a highly potential technology for physical-layer authentication that one of the most critical supplements upper-layer authentication. SEI based on radio frequency (RF) features from circuit difference, rather than cryptography. These are inherent characteristics hardware circuits, which difficult to counterfeit. Recently, various deep learning (DL)-based...

Journal: :Comput. J. 2011
Biming Tian Song Han Sazia Parvin Jiankun Hu Sajal K. Das

The objective of self-healing key distribution is to enable group users to recover session keys by themselves, without requesting additional transmissions from the group manager (GM), even when they miss some broadcast messages. One major benefit of the self-healing key distribution mechanism is the reduction of energy consumption due to the elimination of such additional transmission. Also in ...

Journal: :FME Transactions 2023

Automatic Dependent Surveillance-Broadcast (ADS-B) is a multiparameter surveillance system designed to improve key segments of air traffic: enabling real-time surveillance, raising safety and efficiency levels, improving flight information weather services. ADS-B consists two subsystems, Out In. Although only complete system, In/Out provides numerous benefits (additional situational awareness, ...

Journal: :Electronics 2021

In the post-cloud era, edge computing is a new paradigm with data processed at of network, which can process close to end-user in real time and offload cloud task intelligently. Meanwhile, decentralization, tamper-proof anonymity blockchain technology provide trusted environment for computing. However, it does raise considerable concerns security, privacy, fault-tolerance so on. For example, id...

Journal: :IEEE Transactions on Aerospace and Electronic Systems 2023

In unmanned aerial vehicle (UAV) swarm networks, a group secret key (GSK) is required to enable secured UAV-UAV communications, multicast, and broadcast transmission. Moreover, it can be used for device authentication. Therefore, this paper proposes an efficient GSK protocol denoted as the sequential (SSGK) algorithm distributed UAV swarmsecured communications. The proposed utilizes network cod...

To evaluate the effect of herbicide band application and cultivator on weed control, yield and yield components of potato, an experiment was conducted using factorial arrangement based on randomized complete block design (RCBD) with four replications at Research Field of Ferdowsi University of Mashhad, Mashhad, Iran during 2015. Experimental factors included cultivator at two levels (with and w...

K.A. Nelson P.P. Motavalli P.R. Nash

Poorly drained claypan soils can increase the importance of tillage and N management for corn (Zea mays L.) production. Field research in 2008, 2009 and 2010 (high rainfall years) near Novelty, MO (40° 1' N, 92° 11' W) sought to determine the effect of polymer-coated urea (PCU) placement [strip-tillage (ST) deep banded and no-till (NT) broadcast] and application timing (fall, early preplant...

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید