نتایج جستجو برای: secure communications
تعداد نتایج: 133581 فیلتر نتایج به سال:
Communications processing is an important part of distributed language systems with facilities such as RPC (remote procedure call) and RMI (remote method invocation). For security, messages may require cryptographic operations in addition to ordinary marshaling. We investigate a method for wrapping communications processing around an entity with secure local communication, such as a single mach...
In this paper we consider the problem of key management in a highly-mobile wireless networking environment, such as a dynamic, distributed setting in which command and control nodes move along with individual users. In this scenario, data must be securely multicast from one source to many users, requiring that users be properly keyed. Furthermore, because users move in and out of the session (d...
Kirchhoff-Law-Johnson-Noise (KLJN) secure key distribution (Cho 2005),(Palmer 2007), (Kish 2006), (Mingesz 2013),(Kish 2009),(Mingesz 2008),(Kish 2006b), is a classical physical scheme that is a potential alternative to quantum key distribution. It is also sometimes loosely referred to as the Kish cipher, however, it is a hardware-based scheme for securely distributing cipher keys, and is not a...
The purpose of this project is to explore a different method to secure wireless transmissions. Ideas from both information security and wireless systems will be employed to accomplish our goal. The system will divide a message signal into components that will be broadcasted in a manner such that it is only completely constructible in a local area. This will be accomplished by phasing the antenn...
This work considers the key management for secure multicast in the Logical Key Hierarchy (LKH) model and proposes a methodology to establish the minimal key bit length that guarantees a specified degree of confidentiality for the multicast communications managed within this model. We also introduce the concepts of information lifetime and of information dependence to formalize the intuition tha...
Information-theoretic secrecy is combined with cryptographic secrecy to create a secret-key exchange protocol for wireless networks. A network of transmitters, which already have cryptographically secured channels between them, cooperate to exchange a secret key with a new receiver at a random location, in the presence of passive eavesdroppers at unknown locations. Two spatial point processes, ...
We study the practical effectiveness of privacy amplification for classical key-distribution schemes. We find that in contrast to quantum key distribution schemes, the high fidelity of the raw key generated in classical systems allow the users to always sift a secure shorter key if they have an upper bound on the eavesdropper probability to correctly guess the exchanged key-bits. The number of ...
The need for active safety, highway guidance, telematics, traffic management, cooperative driving, driver convenience and automatic toll payment will require future intelligent vehicles to communicate with other vehicles as well as with the road-side infrastructure. However, inter-vehicle and vehicle to roadside infrastructure communications will impose some security threats against vehicles’ s...
Bell nonlocality is insufficient to ensure the security of a type secure quantum-communications protocol known as DI-QKD.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید