نتایج جستجو برای: key management

تعداد نتایج: 1347875  

Journal: :I. J. Network Security 2014
Mohammad Sabzinejad Farash Mahmoud Ahmadian-Attari

In 2012, Piao et al. proposed a polynomial-based key management for secure intra-group and inter-group communication. In this notes, we point out that there are some security weaknesses of Piao et al.’s intra-group key distribution scheme. One main problem is that their scheme cannot prevent a group member to obtain other members’ secret keys shared with the controller. In addition, their schem...

2015
Deepa S. Kumar M. Abdul Rahman Shanyu Zheng David Manz Jim Alves-Foss Yongdae Kim Adrian Perrig Abhimanyu Kumar Sachin Tripathi Yacine Challal Hamida Seba

Broadcast encryption is the process of delivering encrypted data through a secure channel, intended for multiple users, in which only the privileged users can decrypt the content. In a broadcasting system, all the intended recipients are required to be accommodated in an organized way, which is possible through an efficient key management scheme. An ideal Broadcast Encryption scheme should defi...

2009
Matthias Wilhelm Ivan Martinovic Jens B. Schmitt

Key management is at the heart of cryptography system designs, enabling and ensuring the overall security of such systems. There are a variety of cryptographic protocols to generate and distribute keying material, and in many applications these well-researched solutions offer good performance and security. However, when considering low-cost and low-performance devices such as wireless sensor mo...

Journal: :EURASIP J. Wireless Comm. and Networking 2010
Mohamed-Lamine Messai Makhlouf Aliouat Hamida Seba

Securing a wireless communication has generally a vital importance, particularly when this communication is in a hostile environment like in wireless sensor networks (WSNs). The problem is how to create cryptographic keys between sensor nodes to ensure secure communications. Limited resources of sensor nodes make a public key cryptosystem such as RSA not feasible. So, most solutions rely on a s...

1995
Ashar Aziz

We present a key-distribution scheme that is particularly well suited for use in conjunction with a session-less datagram protocol such as IP or IPv6. We describe how this scheme can be used for both IP unicast and multicast applications, providing an approach for scalable multicast key distribution. We also describe an implementation of this scheme on the Solaris operating system, and present ...

Journal: :Computer Communications 2010
Dan Forsberg

Handover key management in mobile wireless networks targets to minimize the effects of a possible key compromise in the access points. We describe and analyze how the new 3GPP Long Term Evolution (LTE) security architecture and handover keying management fulfills this target. We discuss possible LTE handover key management enhancements and implementation alternatives without losing interoperabi...

1996
Hugo Krawczyk

A secure and versatile key exchange protocol for key management over Internet is presented. SKEME constitutes a compact protocol that supports a variety of realistic scenarios and security models over Internet. It provides clear tradeoos between security and performance as required by the diierent scenarios without incurring in unnecessary system complexity. The protocol supports key exchange b...

2007
YingZhi Zeng Baokang Zhao Jinshu Su Xia Yan Zili Shao

Wireless sensor networks are emerging as a promising solution for various types of futuristic applications for both military and the public. The design of key management schemes is one of the most important aspects and basic research field of secure wireless sensor networks. Efficient key management could guarantee authenticity and confidentiality of the data exchanged among the nodes in the ne...

Journal: :IEICE Transactions 2007
Heeyoul Kim Younho Lee Yongsu Park Hyunsoo Yoon

To control various access privileges in group-oriented applications having multiple data streams, we present a novel reactive key management scheme where each member can obtain the key of a data stream from public parameters only when necessary. Compared with the previous schemes, this scheme significantly reduces the amount of rekey messages for dynamic membership change due to its reactive na...

2003
Yongdae Kim Daniele Mazzocchi Gene Tsudik

Security in collaborative peer groups is an active research topic. Most previous work focused on key management without addressing an important pre-requisite: admission control, i.e., how to securely admit a new member. This paper represents an initial attempt to sketch out an admission control framework suitable for different flavors of peer groups and match them with appropriate cryptographic...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید