نتایج جستجو برای: key
تعداد نتایج: 553708 فیلتر نتایج به سال:
As cloud computing and AI as a Service are provided, it is increasingly necessary to deal with privacy sensitive data. To the data, there two cases of outsourcing process: i) many clients participate dynamically ii) pre-determined. The solutions for protecting data in both multi-key homomorphic encryption (MKHE) scheme threshold (TMKHE) scheme. However, these schemes may be difficult limited re...
There is no abstract
Inflammatory condition is the consequence of defensive mechanism of immune system against viral and bacterial infection, tissue injury, UV radiation, stress and etc. Persistently acute inflammation leads to chronic phase which is characterized by production of pro-inflammatory mediators from T cells. These molecules (e.g. IL-6, TNF-&alpha, IL-1&beta and IL-17) are mostly pleiotropic cytokines i...
Design a Secure Authenticated Key Exchange (AKE) protocol is a wide research area. Many works have been done in this field and remain few open problems. Design an AKE-secure without NAXOS approach is remaining as an open problem. NAXOS approach [18] is used to hide the ephemeral secret key from an adversary even if the adversary in somehow may obtain the ephemeral secret key. Using NAXOS approa...
Hierarchical Access Control in group communication is an active area of research which is difficult to achieve it. Its primary objective is to allow users of a higher authority group to access information or resource held by lower group users and preventing the lower group users to access information held by higher class users. Large collection of collaborative applications in organizations inh...
Keying technique in Wireless Sensor Networks(WSNs) is one of the most emerging fields of WSN security. In order to provide security on WSN, the role of Key distribution technique is considered to be very significant and thus the key management plays a crucial and fundamental roles in the security service of WSNs. This paper reviews pairwise key establishment technique along with the architectur...
With the widespread use of the Internet, the popularity of group communication-based applications has grown considerably. Since most communications over the Internet involve the traversal of insecure networks, basic security services are necessary for these collaborative applications. These security services can be facilitated if the authorized group members share a common secret. In such distr...
Traditionally, secure one-round key exchange protocols in the PKI setting have either achieved perfect forward secrecy, or forms of deniability, but not both. On the one hand, achieving perfect forward secrecy against active attackers seems to require some form of authentication of the messages, as in signed Diffie-Hellman style protocols, that subsequently sacrifice deniability. On the other h...
In this paper the Security Evaluated Standardized Password Authenticated Key Exchange ( SESPAKE ) protocol is proposed (this protocol is approved in the standardization system of the Russian Federation) and its cryptographic properties are analyzed. The SESPAKE protocol includes a key agreement step and a key authentication step. We define new indistinguishability-based adversary model with a t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید