نتایج جستجو برای: key management system
تعداد نتایج: 3273501 فیلتر نتایج به سال:
Scalable group key management solutions are crucial for supporting Internet applications that are based on a group communication model. Many solutions have been proposed and of these the most efficient and scalable ones are based on logical key hierarchies (LKH) with symmetric keys organized in a tree. However, these solutions centralize trust in the group controller and make it an attractive a...
Traditional analysis of group key protocol performance is based on the cost of performing a single operation. We extend this analysis to examine the performance behavior of five group key protocols after execution of multiple operation. This paper reports the results of our experiments for 100 operations consist of combinations of join, leave, mass add and mass leave operations. The results of ...
549 Abstract— Lim et al. proposed a Hybrid Group Key Management scheme for Hierarchical Self-Organizing Sensor Network in 2008 to provide a secure way to pass down the group key for cluster-based communication. This paper presents two practical attacks on the scheme proposed by Lim et al. by tampering sensor nodes of a cluster to recover necessary secret keys and by exploiting the IDS employed ...
In the middle age (500–1500), while European countries were struggling with frightening epidemics such as plague, smallpox, tuberculoses, leprosy, and their medical treatments were based on superstitions and fanaticism, scientists such as Avicenna and Rhazes laid the foundation of the golden period in medicine. In the late periods of golden centuries, during the Mogul invasion of Iran, Rashida...
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic mechanisms. As a result of varied design decisions appropriate to different conditions, a large variety of key distribution protocols exist. There is a need tu explicate key distribution protocols in a way that allows to understand which results t...
In mobile ad hoc networks (MANETs), the research on key management of identity-based scheme is attracting more and more attention. In this paper, we study on four types of identity-based schemes which resist key escrow problem at different degrees, and introduce several schemes for each type. Then, we give an overview of the characteristics of their key management, and made a summary of key gen...
conclusions it is suggested that the steward of health in iran, the ministry of health, develops an appropriate infrastructure and finally puts a high priority on the implementation of the health information management system for elderly health sector in iran. background there are increasing change and development of information in healthcare systems. given the increase in aging population, man...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید