نتایج جستجو برای: key management system
تعداد نتایج: 3273501 فیلتر نتایج به سال:
Contributory group key management schemes are popularly used for dynamic peer group communications in collaborative environments. Previous contributory group key management schemes require every group member to perform a number of expensive Diffie-Hellman operations whenever the group membership changes. This is not always affordable for devices in resource-constrained networks. In this paper, ...
One of the key applications of operational research in health systems management is to improve the mechanism of resource allocation and program planning in order to increase the system efficiency. This study seeks to offer an innovative method for the planning and scheduling of health service units with the aim of reducing the patients' Length of Stay (LOS) in the Cardiac Surgery Ward of Razavi...
Abstract Embedded devices often face security risks such as device loss, cracking, key disclosure and side-channel attacks. Owing to the relative meagreness characterising availability of computing well storage resources, it might be said that embedded themselves have limited traditional management solutions are thus not fully suitable for usage scenarios. In addition, also necessitates conside...
Secure group key distribution and efficient rekeying is one of the most challenging security issues in sensor networks at present. In this paper, Latin square is firstly used to construct orthogonal arrays in order to obtain t-packing designs quickly. Based on cover-free family properties, t-packing designs are adopted in key predistribution phase. Then based secure key-shared method, the pre-d...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید