نتایج جستجو برای: symmetric key management
تعداد نتایج: 1422366 فیلتر نتایج به سال:
A certificate of authenticity (COA) is an inexpensive physical object with a random and unique structure S which is hard to nearexactly replicate. An inexpensive device should be able to scan object’s physical “fingerprint,” a set of features that represents S. In this paper, we explore the requirements that optical media such as DVDs should satisfy, to be considered as COAs. As manufacturing o...
The homomorphic property of the public key cryptosystem has been exploited in order to achieve asymmetric fingerprinting such that only a buyer can obtain fingerprinted content. However, this requires many computations and a wide-band network channel because the entire uncompressed content must be encrypted based on the public key cryptosystem. In this paper, instead of the homomorphic property...
Status of this Memo This RFC speciies an IAB standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "IAB OOcial Protocol Standards" for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document provides deenitions, formats, references, an...
Cheque Truncation System(CTS) is an automatic cheque clearance system implemented by RBI.CTS uses cheque image, instead of the physical cheque itself, for cheque clearance thus reducing the turn around time drastically. This approach holds back the physical movement of cheque from presenting bank to the drawee bank. In CTS, digital image of the cheque is protected using standard public key and ...
The unique characteristics and constraints of MANET have made the traditional approach to security inadequate. With this view in mind decentralized group key management is taken into consideration. A novel structure of the node is proposed and each entity holds a secret share SSi of each node in cluster is controlled by its cluster head, the policy enforcer decides for the working of intelligen...
Wireless sensor networks (WSNs) are a technology of various uses from monitoring surrounding environment to collecting data. Because WSNs operate with limited resources of sensor nodes, its life is extended by cluster-based routing methods. However, WSNs which communicate through a wireless transmission medium are quite vulnerable in terms of security compared to wired networks and their sensor...
Supervisory Control and Data Acquisition (SCADA) is the combination of telemetry and data acquisition. Supervisory Control and Data Acquisition system is compose of collecting of the information, transferring it to the central site, carrying out any necessary analysis and control and then displaying that information on the operator screens. Encryption Schemes are needed to secure communication ...
With the advent of cloud technologies, there is a growing number of easy-to-use services to store files and share them with other cloud users. Cloud service providers try to convince users to trust their services and encourage them to store personal files or corporate documents on their servers. However, both security conscious personal and cooperate users are reluctant to trust cloud service p...
Multicast in Wireless Sensor Networks (WSNs) is an attractive mechanism for delivering data to multiple receivers as it saves bandwidth. To guarantee the security of multicast, the group key is used to encrypt and decrypt the packages. However, providing key management services in WSNs is complicated because sensor nodes possess limited resources of computing, storage and communication. To addr...
We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node. Unlike previous software public-key implementations this approach provides ECommerce grade security; is computationally fast, energy efficient; and has low financial cost — all essential attributes for secure large-...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید