نتایج جستجو برای: secure communication
تعداد نتایج: 391555 فیلتر نتایج به سال:
Mobile-to-Grid Middleware: An Approach for Breaching the Divide Between Mobile and Grid Environments
In this paper we present an architecture of a middleware layer that enables users of mobile devices to seamlessly and securely access distributed resources in a Grid. It lays the ground work for an application toolkit that addresses issues such as delegation of the job to the Grid service, interaction with heterogeneous mobile devices, support for offline processing, secure communication betwee...
In this paper the key storage problem associated with the provision of secure communications between every pair of users in a large network is described, and a possible method of alleviating the problem is discussed. This method, based on the use of finite incidence structures with special properties called key distribution patterns, is shown to generalize earlier work in the area. The more gen...
Percolation in an information-theoretically secure graph is considered where both the legitimate and the eavesdropper nodes are distributed as Poisson point processes. For both the path-loss and the path-loss plus fading model, upper and lower bounds on the minimum density of the legitimate nodes (as a function of the density of the eavesdropper nodes) required for non-zero probability of havin...
Mobile agents raise security issues such as the protection of platform/host that runs the mobile agent against attacks which can harm or use its resources without permission, and another is the need for protection to guard mobile agents and their supporting systems against the malicious attacks from a variety of intervening sources that might alter information it carries and processes when it v...
A pair wise key pre-distribution scheme based on the concept of the Overlap Key Sharing (OKS) and clusters for wireless sensor networks is proposed. This strategy divides the sensing area into square cells and logical groups and distributes key information to the sensor nodes by employing the OKS scheme. Sensor nodes establish their secure communication through using their keys. Analysis and co...
This paper introduces a new protocol independent security mechanism, called PILSC (Protocol Independent Lightweight Secure Communication). PILSC utilizes the security feature of IPv4, defined but not used yet, in order to have standardization in secure communication. We aim to increase the efficiency of the secure data transfer by means of examining the shortages of different security protocols...
The management of secure communication among groups of participants requires a set of secure and efficient operations. In this paper we extend existing work to present a Communication–Computation Efficient Group Key Algorithm (CCEGK) designed to provide both efficient communication and computation, addressing performance, security and authentication issues of CCEGK. Additionally, we compare CCE...
In this paper we present a solution providing secure communications over an extended Ethernet LAN. This solution, proposed by the Applied Mathematics and Telematics Department of the Polytechnic University of Catalonia, is based on a set of secure bridges, called CryptoNets, and a Supervision and Administration Center (SAC), which takes charge of the remote management of the work of these devic...
We propose a framework for secure device-pairing based on contextual information. In contrast to related work, we utilise fuzzy cryptography schemes to establish a common secret among devices and to account for noise in the contextual features. The framework is implemented for ambient audio and its feasibility is demonstrated in a case study. Additionally, we discuss properties of fingerprints ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید