نتایج جستجو برای: key group method

تعداد نتایج: 2918918  

Journal: :Electronics 2021

In recent years, physically unclonable functions (PUFs) have gained significant attraction in IoT security applications, such as cryptographic key generation and entity authentication. PUFs extract the uncontrollable production characteristics of different devices to generate unique fingerprints for applications. When generating PUF-based secret keys, reliability entropy keys are vital factors....

2009
Ting Yuan Jianqing Ma Yiping Zhong Shiyong Zhang

The most common solution for implementing access control into a dynamic group is to use a group key unknown to all but the users in the group. The group key (i.e., session key) is updated for every session throughout the lifetime of the group with the procedure of group key distribution. In this paper, we propose a group key distribution scheme with self-healing property that enables users in a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند - دانشکده ادبیات و علوم انسانی 1392

in new management approaches, in the organizations with inflexible structure, existing of red tapes and interruptions caused by limitations and also non-compliance with environmental changes, create demotivation among staff. with regard to the influence of job motivational potential and its relationship to the type of organizational structure( enabling and dissuasive), the goal of this research...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - پژوهشکده علوم انسانی و اجتماعی 1390

this study attempts to investigate the effect of peers’ revision in comparison to that of the teacher, and whether peers’ comments and teachers’ comments facilitate students’ revision? if yes, which one is more effective? also attempts have been made to see which aspects of language are more highlighted by peers versus teachers when commenting. besides, it is investigating the student’s attitud...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی 1391

abstract this study set out to compare the effect of modality of presentation (subtitled vs. auditory) in the comprehension of verbal content of documentary films among iranian efl students. to this end, (30 male 30 female) students were chosen from two schools. after their homogeneity was established, the students attended the listening sessions to watch five documentary films over t...

پایان نامه :دانشگاه تربیت معلم - سبزوار - دانشکده ادبیات و علوم انسانی 1389

abstract this study aimed at investigating the impact of etymology strategy instruction on the development of vocabulary of iranian intermediate efl learners. etymology, knowledge of origin of words, roots, and affixes, has proved to be a controversial issue and a question of long debate with regard to its impact on the process of vocabulary learning. this study employed etymology strategy in ...

2008
Amjad Gawanmeh

The correctness of group key protocols in communication systems remains a great challenge because of dynamic characteristics of group key construction as we deal with open number of group members. In this paper, we present a combination of three different theorem-proving methods to verify security properties for group oriented protocols. In the first method, rank theorems for forward properties...

2005
Shanyu Zheng Stephen S. Lee

Traditional analysis of group key protocol performance is based on the cost of performing a single operation. We extend this analysis to examine the performance behavior of five group key protocols after execution of multiple operation. This paper reports the results of our experiments for 100 operations consist of combinations of join, leave, mass add and mass leave operations. The results of ...

Journal: :CoRR 2010
Qingfeng Cheng Chuangui Ma

In AFRICACRYPT 2010, Abdalla et al. first proposed a slight modification to the computations steps of the BD protocol, called mBD+P. Then they extended mBD+P protocol into mBD+S protocol. In this paper, we show that both of mBD+P and mBD+S protocols are vulnerable to malicious insiders attack. Further, we propose a simple countermeasure against this attack.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید