نتایج جستجو برای: probabilistic key sharing
تعداد نتایج: 694661 فیلتر نتایج به سال:
In order to hold secure electronic conference in Communication networks via insecure channels, a conference key distribution system should be constructed. The conference key distribution system (CKDS) is used for distributing a conference key shared among the participants of the conference and hence secure communications are achieved. In this paper, by using the secret sharing scheme based on t...
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
Explain the Role of Psychological Capital in Knowledge Sharing of an Organization Abstract The aim of present study was to investigate knowledge sharing approach as essential factor in the advancement of organization's purposes and also the effect of psychological capital dimensions in improving and accelerating of this process and want to measure these effects in transferring knowledge among i...
Group key transfer protocols depend on a mutually trusted key generation center (KGC) to transport the group key to all group members secretly. This approach requires that a trusted sever be set up, and it incurs communication overhead costs. In addition, the existing group key transfer protocols based on secret sharing all use threshold schemes that need to compute a -degree interpolating poly...
We argue the necessity of universally veriiable secret sharing for secrets as individual users' cryptographic keys, and propose protocols to realize such secret sharing for two most common public-key cryptosystems: discrete logarithm based and integer factorization based. The universal veriiabil-ity achieves sharing secret with multi third parties as shareholders using two-party protocols in wh...
Key transfer protocols needs key generation center (KGC) to select and transport session keys to all communication entities secretly, that are mutually trusted. Often, during registration each entity shares a session keys that are encrypted under another secret key by the KGC. In this paper based on secret sharing scheme, we propose an authenticated key transfer protocol that once KGC can broad...
In 1979, Shamir and Blakley independently proposed the concept of secret key decentralization (Shamir, A, 1979, P.612-613 & Backly, G. R, 1979), and the mechanism implementing this idea was called as the (t, n)-threshold scheme. In two schemes, one secret key (the secret key of the system) was divided into n parts (n sub-secret keys) respectively kept by n persons, and for certain integer t(t<n...
A Key Distribution Center enables secure communications among groups of users in a network by providing common keys that can be used with a symmetric encryption algorithm to encrypt and decrypt messages the users wish to send to each other. A Distributed Key Distribution Center is a set of servers of a network that jointly realize a Key Distribution Center. In this paper we propose an unconditi...
studying juridical and legal nature of time sharing samad hazrati[1] abstract in the modern era, which is called communication era, the effect and influence of legal systems are inevitable, since industrial development, technology, sciences and human knowledge result in new events in different fields such as legal regulations and vast relationships among the nations and states result in tra...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید