نتایج جستجو برای: symmetric key management

تعداد نتایج: 1422366  

2011
Thomas Thüm Sandro Schulze Mario Pukall Gunter Saake Sebastian Günther

Custom tailor-made database management systems (DBMS) are an essential asset, especially for embedded systems. The continuously increasing amount of data in automotive systems and the growing network of embedded devices can profit from DBMS. Restrictions in terms of processors, memory, and storage require customizable DBMS that contain only the needed functionality. We present AutoDaMa, a custo...

Journal: :IACR Cryptology ePrint Archive 2017
Vladimir Kolesnikov Mike Rosulek Ni Trieu

Suppose a server holds a long text string and a receiver holds a short pattern string. Secure pattern matching allows the receiver to learn the locations in the long text where the pattern appears, while leaking nothing else to either party besides the length of their inputs. In this work we consider secure wildcard pattern matching (WPM), where the receiver’s pattern is allowed to contain wild...

2004
U. Blumenthal F. Maino

This document describes a symmetric encryption protocol that supplements the protocols described in the User-based Security Model (USM), which is a Security Subsystem for version 3 of the Simple Network Management Protocol for use in the SNMP Architecture. The symmetric encryption protocol described in this document is based on the Advanced Encryption Standard (AES) cipher algorithm used in Cip...

2006
Enrique Rodriguez

Since its initial development Kerberos has evolved to become the widely accepted system for implementing centralized authentication services. During this time the Lightweight Directory Access Protocol (LDAP) has become the accepted method for the centralized distribution of identity information. Organizations increasingly deploy both infra-structural components in order to support management of...

Journal: :Designs, Codes and Cryptography 2010

Journal: :Journal of Discrete Algorithms 2015

Journal: :Intelligent Automation & Soft Computing 2010
Mohammad Al-Shurman Seong-Moo Yoo Bonam Kim Seungjin Park

Today’s ever smaller computing systems are increasingly spreading in our ubiquitous environment. Being available ubiquitously in the devices and appliances that we use everyday and everywhere, these embedded computing systems are accessible to mobile users via hand-held devices connected over wireless networks. A mobile ad hoc network (MANET) is one of the important wireless networks. In a MANE...

2012
Miodrag J. Mihaljević

This chapter yields a review of certain mathematical approaches for analysis and design of the basic cryptographic elements for establishing information security in information-communication systems. The following two topics are addressed: selected issues on stream ciphers for encryption and key management based on broadcast encryption. Certain coding related issues for security evaluation and ...

2012
Ali Fanian Mehdi Berenjkoub

Wireless sensor networks usually comprise a number of sensors with limited resources. Each sensor includes sensing equipment, a data processing unit, a short range radio device and a battery [Pottie & Kaiser, 2000; Kahn et al.,1999; Akyildiz, 2002]. These networks have been considered for various purposes including border security, military target tracking and scientific research in dangerous e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید