نتایج جستجو برای: key

تعداد نتایج: 553708  

Journal: :IEEE Access 2023

As cloud computing and AI as a Service are provided, it is increasingly necessary to deal with privacy sensitive data. To the data, there two cases of outsourcing process: i) many clients participate dynamically ii) pre-determined. The solutions for protecting data in both multi-key homomorphic encryption (MKHE) scheme threshold (TMKHE) scheme. However, these schemes may be difficult limited re...

Abolghasem Ajami, Alireza Rafiei, Hossein Asgarian-Omran, Omolbanin Amjadi, Vahid Hosseini,

Inflammatory condition is the consequence of defensive mechanism of immune system against viral and bacterial infection, tissue injury, UV radiation, stress and etc. Persistently acute inflammation leads to chronic phase which is characterized by production of pro-inflammatory mediators from T cells. These molecules (e.g. IL-6, TNF-&alpha, IL-1&beta and IL-17) are mostly pleiotropic cytokines i...

ژورنال: Current Medical Mycology 2016

No abstract is available for this article.

Journal: :I. J. Network Security 2018
Mojahed Mohamed Xiaofen Wang Xiaosong Zhang

Design a Secure Authenticated Key Exchange (AKE) protocol is a wide research area. Many works have been done in this field and remain few open problems. Design an AKE-secure without NAXOS approach is remaining as an open problem. NAXOS approach [18] is used to hide the ephemeral secret key from an adversary even if the adversary in somehow may obtain the ephemeral secret key. Using NAXOS approa...

Journal: :JCS 2014
Nafeesa Begum Jeddy Krishnan Kumar V. Sumathy

Hierarchical Access Control in group communication is an active area of research which is difficult to achieve it. Its primary objective is to allow users of a higher authority group to access information or resource held by lower group users and preventing the lower group users to access information held by higher class users. Large collection of collaborative applications in organizations inh...

2013
V K Singh Kalpana Sharma

Keying technique in Wireless Sensor Networks(WSNs) is one of the most emerging fields of WSN security. In order to provide security on WSN, the role of Key distribution technique is considered to be very significant and thus the key management plays a crucial and fundamental roles in the security service of WSNs. This paper reviews pairwise key establishment technique along with the architectur...

Journal: :Int. Journal of Network Management 2006
Ahmed Abdel-Hafez Ali Miri Luis Orozco-Barbosa

With the widespread use of the Internet, the popularity of group communication-based applications has grown considerably. Since most communications over the Internet involve the traversal of insecure networks, basic security services are necessary for these collaborative applications. These security services can be facilitated if the authorized group members share a common secret. In such distr...

Journal: :IACR Cryptology ePrint Archive 2011
Cas J. F. Cremers Michèle Feltz

Traditionally, secure one-round key exchange protocols in the PKI setting have either achieved perfect forward secrecy, or forms of deniability, but not both. On the one hand, achieving perfect forward secrecy against active attackers seems to require some form of authentication of the messages, as in signed Diffie-Hellman style protocols, that subsequently sacrifice deniability. On the other h...

Journal: :IACR Cryptology ePrint Archive 2015
Stanislav Smyshlyaev Igor B. Oshkin Evgeniy K. Alekseev Liliya R. Ahmetzyanova

In this paper the Security Evaluated Standardized Password Authenticated Key Exchange ( SESPAKE ) protocol is proposed (this protocol is approved in the standardization system of the Russian Federation) and its cryptographic properties are analyzed. The SESPAKE protocol includes a key agreement step and a key authentication step. We define new indistinguishability-based adversary model with a t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید