نتایج جستجو برای: group key management

تعداد نتایج: 2218760  

2008
David Manz Jim Alves-Foss Shanyu Zheng

: The need for rapidly configurable, secure communication among groups of participants has resulted in the study of group key agreement protocols. The study of these protocols has been primarily theoretical. In this paper, we present the results of simulation studies of the methods provided by four group-key agreement protocols, EGK, TGDH, STR and CCEGK. The results of the simulation clarify th...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران - دانشکده علوم انسانی و اجتماعی 1391

the present study aimed to investigate the possible effects of focused highlighted error feedback on grammatical accuracy of writing among iranian intermediate efl learners. after selecting 52 homogenous participants from among 70 university students attending azad university of rasht and randomly dividing them into two intact groups of 26 students, the researcher exposed the participants of th...

Journal: :Computer Standards & Interfaces 2009
Jen-Chiun Lin Kuo-Hsuan Huang Feipei Lai Hung-Chang Lee

In many network applications, including distant learning, audio webcasting, video streaming, and online gaming, often a source has to send data to many receivers. IP multicasts and application-layer multicasts provide efficient and scalable one-to-many or many-to-many communications. A common secret key, the group key, shared by multiple users can be used to secure the information transmitted i...

Journal: :I. J. Network Security 2008
Said Gharout Yacine Challal Abdelmadjid Bouabdallah

In the last few years, multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. Some multicast applications require confidentiality for transmitted data. So, a traffic encryption key is used to assure this confidentiality and has to be changed and distributed to all valid members whenever a membership change (join or leave) occur...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده ادبیات و زبانهای خارجی 1393

abstract listening is a key and main tool in second language skill and its development is of prime concern to teachers and learners. furthermore, the application of technology in language classrooms has become more commonplace in the last fifty years. computer and the internet have made foreign language materials easy to access and use. so, the present study is an attempt to examine the effec...

Journal: :IEICE Transactions 2009
Junbeom Hur Hyunsoo Yoon

Scalability is one of the most important requirements for secure multicast in a multi-group environment. In this study, we propose a decentralized multi-group key management scheme that allows each multicast group sender to control the access to its group communication independently. Scalability is enhanced by local rekeying and inter-working among different subgroups. The group key secrecy and...

Journal: :CoRR 2016
Vinod Kumar S. K. Pandey Rajendra Kumar

In the secure group communication, data is transmitted in such a way that only the group members are able to receive the messages. The main problem in the solution using symmetric key is heavy re-keying cost. To reduce re-keying cost tree based architecture is used. But it requires extra overhead to balance the keytree in order to achieve logarithmic re-keying cost. The main challenging issue i...

2000
Chung Kei Wong Simon S. Lam

A major problem area in securing group communications is group key management. In this paper, we present the design and architecture of a scalable group key management system called Keystone. Key-stone uses a novel key graph technique for scalable group key management. In Keystone, the authentica-tion of client identity can be oooaded to one or more registrars to improve performance. For eecien...

Journal: :IEEE Journal on Selected Areas in Communications 1999
Marcel Waldvogel Germano Caronni Dan Sun Nathalie Weiler Bernhard Plattner

Middleware supporting secure applications in a distributed environment faces several challenges. Scalable security in the context of multicasting or broadcasting is especially hard when privacy and authenticity is to be assured to highly dynamic groups where the application allows participants to join and leave at any time. Unicast security is well-known and has widely advanced into production ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید