نتایج جستجو برای: random key pre distribution

تعداد نتایج: 1636984  

Journal: :IACR Cryptology ePrint Archive 2008
Vanesa Daza Javier Herranz Germán Sáez

Dutta and Mukhopadhyay have recently proposed some very efficient selfhealing key distribution schemes with revocation. The parameters of these schemes contradict some results (lower bounds) presented by Blundo et al. In this paper different attacks against the schemes of Dutta and Mukhopadhyay are explained: one of them can be easily avoided with a slight modification in the schemes, but the o...

Journal: :Australasian J. Combinatorics 2005
Simona Bonvicini Gloria Rinaldi

Journal: :IACR Cryptology ePrint Archive 2002
Régis Dupont Andreas Enge

Journal: :International Journal of Research in Engineering and Technology 2014

2009
Ting Yuan Jianqing Ma Yiping Zhong Shiyong Zhang

The most common solution for implementing access control into a dynamic group is to use a group key unknown to all but the users in the group. The group key (i.e., session key) is updated for every session throughout the lifetime of the group with the procedure of group key distribution. In this paper, we propose a group key distribution scheme with self-healing property that enables users in a...

Journal: :International Journal in Foundations of Computer Science & Technology 2014

2008
Boushra Maala Yacine Challal Abdelmadjid Bouabdallah

Early researches focused on the security of homogenous sensor networks. However, recent works have demonstrated that the presence of heterogeneous sensor nodes gives better performance than homogenous ones in terms of energy consumptions, storage overhead, and network connectivity. In this paper, we propose a hierarchical key management scheme named HERO which is based on random key pre-distrib...

Journal: :CoRR 2009
Eric Ke Wang Lucas Chi Kwong Hui Siu-Ming Yiu

Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual authentica...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید