نتایج جستجو برای: symmetric key management
تعداد نتایج: 1422366 فیلتر نتایج به سال:
In the last decade, we witness a proliferation of potential application domains of wireless sensor networks (WSN). Therefore, a host of research works have been conducted by both academic and industrial communities. Nevertheless, given the sensitivity of the potential applications that are generally tightly related to the physical world and may be human beings, a large scale deployment of WSN d...
The fast evolution of processor performance necessitates a permanent evolution of all the multi-processor components, even for small to medium-scale symmetric multiprocessors (SMP) build around shared busses. This kind of multiprocessor is especially attractive because the problem of data coherency in caches can be solved by a class of snooping protocols specific to these shared-bus architectur...
After discussing the concept of DUKPT based symmetric encryption key management (e. g. , for 3DES) and definition of cloud or remote wallet, the paper analyses applicability of DUKPT to different use cases like mobile banking, NFC payment using EMV contactless card and mobile based EMV card emulation, web browser based transaction and cloud or remote wallet. Cloud wallet is an emerging payment ...
Symmetric encryption is the most commonly employed security solution in wireless sensor networks (WSNs). In this paper, a new approach that employs public-key cryptography during key establishment is proposed. In a WSN, the main issue for public-key cryptography is represented by communication and computational overheads. In order to reduce these requirements, a new authentication system based ...
Wireless sensor network is a tremendous emerging technology provides communication services for environmental monitoring and target tracking for mass public and military. With increasing of this smart network popularity sensor network faced various challenges and threats. The inclusion of wireless sensor nodes also incurs different types of security threats in network. Mostly networks are using...
We provide a stronger definition of anonymity in the context of shared symmetric key primitives, and show that existing schemes do not provide this level of anonymity. A new scheme is presented to share symmetric key operations amongst a set of participants according to a (t, n)-threshold access structure. We quantify the amount of information the output of the shared operation provides about t...
On the basis of the bachelor thesis ”performance comparison of cryptographic algorithms in Smart Grid applications” supervised by Dipl. Inf. Michael Niedermeier and Prof. Dr. Hermann de Meer at the chair of Computer Networks and Communications, this paper covers the analysis of the privacy ensuring capabilities of homomorphic cryptography in the Smart Grid with regard to its energy efficiency. ...
Classification of vectorial Boolean functions up to affine equivalence is used widely to analyze various cryptographic and implementation properties of symmetric-key algorithms. We show that there exist 75 affine equivalence classes of 5-bit quadratic permutations. Furthermore, we explore important cryptographic properties of these classes, such as linear and differential properties and degrees...
** (West Bengal University of Technology, West Bengal, India) *** (West Bengal State University, West Bengal, India) ABSTRACT Key management represents a major and the most sensitive part of cryptographic systems. It includes key generation, key distribution, key storage, and key deletion. It is also considered the hardest part of cryptography. Designing secure cryptographic algorithms is hard,...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید