نتایج جستجو برای: random key pre distribution

تعداد نتایج: 1636984  

Journal: :IACR Cryptology ePrint Archive 2007
Marek Klonowski Miroslaw Kutylowski Michal Ren Katarzyna Rybarczyk

We consider a key distribution scheme for securing node-to-node communication in sensor networks. While most schemes in use are based on random predistribution, we consider a system of dynamic pairwise keys based on design due to Ren, Tanmoy and Zhou. We design and analyze a variation of this scheme, in which capturing a node does not lead to security threats for the past communication. Instead...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان همدان - دانشکده ادبیات و علوم انسانی 1390

abstract this study is an attempt to determine the effect of nano- technology education on science lesson for fifth grade in primary school in the city of kermanshah. this research is experimental and is conducted in the from of pre-test and post- test for the control group. an achievement test was administered to determine the rate of learning in the students. the research is an applied one. ...

Journal: :Wireless Communications and Mobile Computing 2006
Kui Ren Kai Zeng Wenjing Lou

In a wireless sensor network (WSN), pre-distribution of secret keys is possibly the most practical approach to protect network communications. To meet the stringent resource constraints of the sensor nodes, key pre-distribution schemes should be highly efficient, require as little storage space as possible, and at the same time, maintain a strong security strength, that is, high resilience agai...

Journal: :Int. J. Pervasive Computing and Communications 2004
Ramaraju Kalidindi Vamsi Paruchuri Shivakumar Basavaraju Cariappa Mallanda Archit Kulshrestha Lydia Ray Rajgopal Kannan Arjan Durresi S. Sitharama Iyengar

Security in sensor networks is more important than traditional networks as they are deployed in hostile environments and are more prone to capture. Trusted third party authentication schemes, public-key systems are not suitable owing to their high resource requirements. Key pre-distribution was introduced in [3] to solve this problem. Our scheme achieves identical connectivity compared to the r...

2017
Minyoung Bae Hana Kang Ju-Sung Kang Yongjin Yeom

It is believed that the quantum cryptography based on quantum key distribution achieves unconditional security. However, the additional authentication mechanism applied to the quantum cryptography needs to be studied since it is difficult for the quantum cryptography alone to prevent manin-the-middle attacks. Thus, we propose two authentication mechanisms combined with modern cryptography that ...

2007
Matthias Christandl Artur Ekert Michal Horodecki Pawel Horodecki Jonathan Oppenheim Renato Renner

Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state ρABE . In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standar...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده ادبیات و زبانهای خارجی 1391

this study was intended to analyze the listening tapescripts of the elementary and pre-intermediate levels of total english textbooks from the pragmatic dimension of language functions and speech acts in order to see whether the listening tasks are pragmatically informative or not. for this purpose, 8 conversations from the two books were selected randomly, and then, the two pragmatic models of...

Journal: :Quantum Information & Computation 2009
G. B. Xavier Thiago Ferreira da Silva G. Vilela de Faria Guilherme Penello Temporão Jean Pierre von der Weid

A simple protocol which takes advantage of the inherent random times of detections in single photon counting modules is presented for random active basis choices when using entanglement-based protocols for Quantum Key Distribution (QKD). It may also be applicable to the BB84 protocol in certain cases. The scheme presented uses the single photon detectors already present on a QKD setup, working ...

2016
Nazmul Islam M. A. Moyeen

The ample use of Wireless Sensor Network demands highly effective security mechanism for its sound operation in any hostile environment. The security of encrypted information greatly dependents on the rigidity of underlying Key Management techniques. Hence, key management becomes the most significant issue in case of security of Wireless Sensor Networks. The purpose of this paper is to assess m...

2008
Qin Li Dongyang Long Changji Wang

Two arbitrated quantum signature schemes, one with message recovery and the other with appendix, are proposed. The most significant property of the proposed schemes is that both the signatory and the receiver can share and use a long-term secret key with the arbitrator by utilizing the key together with a random number. While in previous quantum signature schemes, the shared key could be used o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید