نتایج جستجو برای: key

تعداد نتایج: 553708  

2014
Hitesh Singh D. L. Gupta A. K Singh

Quantum key distribution (QKD) provides a way for distribution of secure key in at least two parties which they initially share. And there are many protocols for providing a secure key i.e. BB84 protocol, SARG04 protocol, E91 protocol and many more. In this paper all the concerned protocols that share a secret key is explained and comparative study of all protocols shown.

Journal: :I. J. Network Security 2016
Depeng Li Srinivas Sampalli

Contributory group key management schemes are popularly used for dynamic peer group communications in collaborative environments. Previous contributory group key management schemes require every group member to perform a number of expensive Diffie-Hellman operations whenever the group membership changes. This is not always affordable for devices in resource-constrained networks. In this paper, ...

2005
Steven M. Bellovin Russell Housley

The question often arises of whether or not a given security system requires some form of automated key management, or whether manual keying is sufficient. This memo proposes guidelines for making such decisions. The presumption is that when symmetric cryptographic mechanisms are used in a protocol, then automated key management is generally but not always needed. If manual keying is proposed, ...

Journal: :iranian biomedical journal 0
فرهاد ذاکر farhad zaker alison may alan k burnett

the characteristics of cellular and molecular mechanisms associated with cell proliferation and differentiation is important to understand malignancy. in this report we characterise a leukemic model, d5a1, to study the action of differentiation agent, cellular events and gene expression of the selected transcription factors. cells induced with 4 mm hexamethylene bisacetamide (hmba) caused signs...

Journal: :بحوث فی اللغه العربیه 0
صادق فتحی دهکردی  استادیار گروه زبان و ادبیات عربی ـ پردیس قم وابسته به دانشگاه تهران. صادق فتحی دهکردی هیئت علمی

â â â  poetic stories in ilia abu mazi’s poetic works â â â  sadeq fathi dehkordi * â  shlyr fathi ** â  abstract â  â  poetic story is a kind of art firmly connected to poetry and story and is a sign of restoration in arabic poetry furthermore, it is an artistic field for presenting poets' ability in putting poetry and tale together. this genre has included many current poetic works. ab...

2003
Nuttapong Attrapadung Kazukuni Kobara Hideki Imai

We study two closely related primitives: Broadcast Encryption and Key Predistribution Schemes (KPS). Broadcast Encryption allows a broadcaster to broadcast an encrypted message so that only a designated group of users can decrypt it. KPS allows a designated group of users to establish a common key non-interactively. We discover a generic method to construct efficient broadcast encryption scheme...

2001
Olivier Pereira Jean-Jacques Quisquater

The Cliques protocols are extensions of the Diffie-Hellman key exchange protocol to a group setting. In this paper, we are analysing the A-GDH.2 suite that is intended to allow a group to share an authenticated key and to perform dynamic changes in the group constitution (adding and deleting members, ...). We are proposing an original method to analyze these protocols and are presenting a numbe...

2009
Takayuki Shimizu Hisato Iwai Hideichi Sasaoka

As a countermeasure for eavesdroppers in wireless communications, a secret key agreement scheme using a variable directional antenna called ESPAR antenna was developed. In this scheme, the process of information reconciliation is necessary to correct the discrepancies between the legitimate users’ keys. In this paper, we propose a new information reconciliation protocol using the reliability of...

Journal: :Int. Journal of Network Management 2004
Fu-Yuan Lee Shiuh-Pyng Shieh

Securing group communications in dynamic and large-scale groups is more complex than securing one-to-one communications due to the inherent scalability issue of group key management. In particular, cost for key establishment and key renewing is usually relevant to the group size and subsequently becomes a performance bottleneck in achieving scalability. To address this problem, this paper propo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید