نتایج جستجو برای: secure communication

تعداد نتایج: 391555  

2005
Umar Kalim Hassan Jameel Ali Sajjad Sungyoung Lee

In this paper we present an architecture of a middleware layer that enables users of mobile devices to seamlessly and securely access distributed resources in a Grid. It lays the ground work for an application toolkit that addresses issues such as delegation of the job to the Grid service, interaction with heterogeneous mobile devices, support for offline processing, secure communication betwee...

Journal: :Discrete Applied Mathematics 1988
Chris J. Mitchell Fred Piper

In this paper the key storage problem associated with the provision of secure communications between every pair of users in a large network is described, and a possible method of alleviating the problem is discussed. This method, based on the use of finite incidence structures with special properties called key distribution patterns, is shown to generalize earlier work in the area. The more gen...

Journal: :CoRR 2011
Rahul Vaze

Percolation in an information-theoretically secure graph is considered where both the legitimate and the eavesdropper nodes are distributed as Poisson point processes. For both the path-loss and the path-loss plus fading model, upper and lower bounds on the minimum density of the legitimate nodes (as a function of the density of the eavesdropper nodes) required for non-zero probability of havin...

Journal: :IJMCMC 2009
Qi Wei Ahmed Patel

Mobile agents raise security issues such as the protection of platform/host that runs the mobile agent against attacks which can harm or use its resources without permission, and another is the need for protection to guard mobile agents and their supporting systems against the malicious attacks from a variety of intervening sources that might alter information it carries and processes when it v...

2013
Yuquan Zhang

A pair wise key pre-distribution scheme based on the concept of the Overlap Key Sharing (OKS) and clusters for wireless sensor networks is proposed. This strategy divides the sensing area into square cells and logical groups and distributes key information to the sensor nodes by employing the OKS scheme. Sensor nodes establish their secure communication through using their keys. Analysis and co...

2006
M. Amaç Güvensan Ali Gökhan Yavuz

This paper introduces a new protocol independent security mechanism, called PILSC (Protocol Independent Lightweight Secure Communication). PILSC utilizes the security feature of IPv4, defined but not used yet, in order to have standardization in secure communication. We aim to increase the efficiency of the secure data transfer by means of examining the shortages of different security protocols...

Journal: :Computer Networks 2007
Shanyu Zheng David Manz Jim Alves-Foss

The management of secure communication among groups of participants requires a set of secure and efficient operations. In this paper we extend existing work to present a Communication–Computation Efficient Group Key Algorithm (CCEGK) designed to provide both efficient communication and computation, addressing performance, security and authentication issues of CCEGK. Additionally, we compare CCE...

1993
J. Forné M. Soriano J. L. Melús F. Recacha

In this paper we present a solution providing secure communications over an extended Ethernet LAN. This solution, proposed by the Applied Mathematics and Telematics Department of the Polytechnic University of Catalonia, is based on a set of secure bridges, called CryptoNets, and a Supervision and Administration Center (SAC), which takes charge of the remote management of the work of these devic...

2011
Stephan Sigg Dominik Schürmann Yusheng Ji

We propose a framework for secure device-pairing based on contextual information. In contrast to related work, we utilise fuzzy cryptography schemes to establish a common secret among devices and to account for noise in the contextual features. The framework is implemented for ambient audio and its feasibility is demonstrated in a case study. Additionally, we discuss properties of fingerprints ...

Journal: :Journal of the Korea Institute of Information and Communication Engineering 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید