نتایج جستجو برای: symmetric key management

تعداد نتایج: 1422366  

2009
Deepak Vijaywargi Dave Lewis Darko Kirovski

A certificate of authenticity (COA) is an inexpensive physical object with a random and unique structure S which is hard to nearexactly replicate. An inexpensive device should be able to scan object’s physical “fingerprint,” a set of features that represents S. In this paper, we explore the requirements that optical media such as DVDs should satisfy, to be considered as COAs. As manufacturing o...

Journal: :IEICE Transactions 2006
Minoru Kuribayashi Hatsukazu Tanaka

The homomorphic property of the public key cryptosystem has been exploited in order to achieve asymmetric fingerprinting such that only a buyer can obtain fingerprinted content. However, this requires many computations and a wide-band network channel because the entire uncompressed content must be encrypted based on the public key cryptosystem. In this paper, instead of the homomorphic property...

Journal: :RFC 1989
John Linn

Status of this Memo This RFC speciies an IAB standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "IAB OOcial Protocol Standards" for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document provides deenitions, formats, references, an...

Journal: :CoRR 2015
S. R. Sreela G. Santhosh Kumar V. P. Binu

Cheque Truncation System(CTS) is an automatic cheque clearance system implemented by RBI.CTS uses cheque image, instead of the physical cheque itself, for cheque clearance thus reducing the turn around time drastically. This approach holds back the physical movement of cheque from presenting bank to the drawee bank. In CTS, digital image of the cheque is protected using standard public key and ...

2010
Sugandha Singh Navin Rajpal Ashok Kale Sharma Ritu Pahwa

The unique characteristics and constraints of MANET have made the traditional approach to security inadequate. With this view in mind decentralized group key management is taken into consideration. A novel structure of the node is proposed and each entity holds a secret share SSi of each node in cluster is controlled by its cluster head, the policy enforcer decides for the working of intelligen...

2010
Jinsu Kim Junghyun Lee Keewook Rim

Wireless sensor networks (WSNs) are a technology of various uses from monitoring surrounding environment to collecting data. Because WSNs operate with limited resources of sensor nodes, its life is extended by cluster-based routing methods. However, WSNs which communicate through a wireless transmission medium are quite vulnerable in terms of security compared to wired networks and their sensor...

2013
Tai-hoon Kim

Supervisory Control and Data Acquisition (SCADA) is the combination of telemetry and data acquisition. Supervisory Control and Data Acquisition system is compose of collecting of the information, transferring it to the central site, carrying out any necessary analysis and control and then displaying that information on the operator screens. Encryption Schemes are needed to secure communication ...

Journal: :CoRR 2016
Kemal Bicakci Davut Deniz Yavuz Sezin Gurkan

With the advent of cloud technologies, there is a growing number of easy-to-use services to store files and share them with other cloud users. Cloud service providers try to convince users to trust their services and encourage them to store personal files or corporate documents on their servers. However, both security conscious personal and cooperate users are reluctant to trust cloud service p...

Journal: :CoRR 2011
Lin Yao Bing Liu Feng Xia Guowei Wu Qiang Lin

Multicast in Wireless Sensor Networks (WSNs) is an attractive mechanism for delivering data to multiple receivers as it saves bandwidth. To guarantee the security of multicast, the group key is used to encrypt and decrypt the packages. However, providing key management services in WSNs is complicated because sensor nodes possess limited resources of computing, storage and communication. To addr...

2009
Wen Hu Peter I. Corke Wen Chan Shih Leslie Overs

We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node. Unlike previous software public-key implementations this approach provides ECommerce grade security; is computationally fast, energy efficient; and has low financial cost — all essential attributes for secure large-...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید