نتایج جستجو برای: key group method

تعداد نتایج: 2918918  

Journal: :I. J. Network Security 2015
Vankamamidi Srinivasa Naresh Nistala V. E. S. Murthy

The aim of this paper is to propose an efficient and simpler Contributory Group Key Agreement protocol (CGKA) based on Elliptic Curve Diffie Hellman (ECDH). In this CGKA protocol, a member acts as a group controller (GC) and forms two-party groups with remaining group members and generates an ECDH-style shared key per each two-party group. It then combines these keys into a single group key and...

Journal: :gastroenterology and hepatology from bed to bench 0
leila ganji department of pathobiology, school of public health, university of medical sciences, tehran, iran masoud alebouyeh 2- foodborne and waterborne diseases research center, research institute for gastroenterology and liver diseases, shahid beheshti university of medical science, tehran, iran. 3- gastroenterology and liver diseases research center, research institute for gastroenterology and liver diseases, shahid beheshti university of medical science, tehran, iran. mohammad hassan shirazi 1- department of pathobiology, school of public health, university of medical sciences, tehran, iran seyed saeed eshraghi department of pathobiology, school of public health, university of medical sciences, tehran, iran abbas mirshafiey 1- department of pathobiology, school of public health, university of medical sciences, tehran, iran naser ebrahimi daryani department of gastroenterology and hepatology, school of medicine, tehran university of medical sciences, tehran, iran.

.

2007
Qin Ke Zhou Mingtian Liu Naiqi Hao Yujie Guo Jiandong

This paper proposes a novel scheme of group key management based on Jacobian Elliptic Chebyshev Rational Map, named Jacobian Group Key Management(JGKM). The scheme is more efficient than other group key managements since fewer re-keying messages are sent when group membership changes. Besides, it provides both forward and backward secrecy. Therefore, this proposal is helpful to deploy secure mu...

2003
Jyh-How Huang Shivakant Mishra

This paper describes the design, implementation, and evaluation of Mykil, which is a new key distribution protocol for secure group multicast. Mykil has been designed to be scalable to large group sizes. It is based on a combination of group-based hierarchy and key-based hierarchy systems for group key management. Important advantages of Mykil include a fast rekeying operation for large group s...

Journal: :IACR Cryptology ePrint Archive 2006
Mark Manulis

In this paper we overview a large number of currently known group key exchange protocols while focusing on the protocols designed for more than three participants (for an overview of twoand three-party key exchange protocols we refer to [BM03, DB05c]). For each mentioned protocol we briefly describe the current state of security based on the original analysis as well as later results appeared i...

2009
Yanjiang Yang Jianying Zhou Robert H. Deng Feng Bao

Self-healing group key distribution is a primitive aimed to achieve robust key distribution in wireless sensor networks (WSNs) over lossy communication channels. However, all the existing self-healing group key distribution schemes in the literature are designed for homogenous WSNs that do not scale. In contract, heterogeneous WSNs have better scalability and performance. We are thus motivated ...

2007

When a set of users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution itself. Strong corruptions are attacks by which an adversary can reveal these ephemeral secrets. Undoubtedly, their security impact is serious, and thus specifying appropriate security requirements and designing secure GKE pr...

2009
Mark Manulis

We enrich the classical notion of group key exchange (GKE) protocols by a new property that allows each pair of users to derive an independent peer-to-peer (p2p) key on-demand and without any subsequent communication; this, in addition to the classical group key shared amongst all the users. We show that GKE protocols enriched in this way impose new security challenges concerning the secrecy an...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1391

this ethnographic case study research was carried out in a private school setting in the context of iran. the research tried to explore the analysis and identity construction of a group of learners and teachers along with the content analysis of books on the basis of four types of commodified, political, national and narrative identities. how english language learners and teachers in an informa...

2014

The third important aspect of security is encryption to transfer messages among the users in a secure manner. Group key management discussed in the earlier chapter is applicable for transferring messages securely to the members in a group. Apart from transferring messages to the members in a group, messages can be transferred securely to an individual user. Encryption plays a major role in such...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید