نتایج جستجو برای: key group method

تعداد نتایج: 2918918  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1389

abstract present research considered to examine and compare shahrray 14 years girls and boys narrative concerning with their responsibilities in this research, statistical society are 14 years girls and boys of shahrry . for performing this research. first, 14 years of 50 boys and 50 girls were selected in accidental method and have filled memati hormaled adolescents responsibility questioner...

Journal: :CoRR 2015
Quoc-Cuong To Benjamin Nguyen Philippe Pucheral

The aim of this technical report is to complement the work in [To et al. 2014] by proposing a Group Key Exchange protocol so that the Querier and TDSs (and TDSs themselves) can securely create and exchange the shared key. Then, the security of this protocol is formally proved using the game-based model. Finally, we perform the comparison between this protocol and other related works.

Journal: :CoRR 2016
Mohamed Baouch Juan Antonio López-Ramos Reto Schnyder Blas Torrecillas

In this work, we introduce an active attack on a Group Key Exchange protocol by Burmester and Desmedt. The attacker obtains a copy of the shared key, which is created in a collaborative manner with the legal users in a communication group.

2006
Shanyu Zheng David Manz Yuzhe Chen

Several group key protocols have been presented in the literature to enable secrecy of communication among dynamic groups of participants. However, there is a lack of consistency in the literature in terms of operations supported and performance metrics of the various protocols. This makes it difficult for designers to choose the best protocol for their specific applications. To alleviate this ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سمنان - دانشکده علوم انسانی 1393

learning-oriented assessment seeks to emphasise that a fundamental purpose of assessment should be to promote learning. it mirrors formative assessment and assessment for learning processes. it can be defined as actions undertaken by teachers and / or students, which provide feedback for the improvement of teaching and learning. it also contrasts with equally important measurement-focused appro...

2005
Shanyu Zheng Jim Alves-Foss Stephen S. Lee

A few group key protocols are analyzed, implemented and deployed, but the costs associated with them have been poorly understood. Their analysis of group key agreements performance is based on the cost of performing a single operation. In this paper we extend this analysis to examine the performance behavior of five group key protocols after execution of multiple operation. We report our experi...

2011
R. Siva Ranjani

Various network applications require sending data onto one or many members, maintaining security in the large groups is one of the major obstacles for controlling access. Unfortunately, IP multicast is not providing any security over the group communication. Group key management is a fundamental mechanism for secured multicast. This paper presents relevant group key management protocols. Then, ...

Journal: :CoRR 2016
Peter Gutmann Steven M. Bellovin Matt Blaze Ronald L. Rivest Nigel P. Smart

This paper presents a new crypto scheme whose title promises it to be so boring that no-one will bother reading past the abstract. Because of this, the remainder of the paper is left blank.

Journal: :CoRR 2016
Juan Antonio López-Ramos Joachim Rosenthal Davide Schipani Reto Schnyder

A new proposal for group key exchange is introduced which proves to be both efficient and secure and compares favorably with state of the art protocols.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید