نتایج جستجو برای: Symmetric Key Management

تعداد نتایج: 1422366  

2007
Brian A. Carter Ari Kassin Tanja Magoc

Since the earliest days of necessity for secret transmission of messages, which date back to thousands years BCE, different methods have been used to transfer the message between two parties. These days, systematic ways for transmitting secret information are used, and the fear of cracking the message is increasing with the development of breaking algorithms for different encryption techniques....

2006
Aziz Mohaisen DaeHun Nyang

Wireless Sensor Network (WSN) consists of huge number of sensor nodes which are small and inexpensive with very limited resources. The public key cryptography is undesirable to be used in WSN because of the limitations of the resources. A key management and predistribution techniques are required to apply the symmetric key cryptography in such a big network. Many key predistribution techniques ...

2015
Deepa S. Kumar M. Abdul Rahman Shanyu Zheng David Manz Jim Alves-Foss Yongdae Kim Adrian Perrig Abhimanyu Kumar Sachin Tripathi Yacine Challal Hamida Seba

Broadcast encryption is the process of delivering encrypted data through a secure channel, intended for multiple users, in which only the privileged users can decrypt the content. In a broadcasting system, all the intended recipients are required to be accommodated in an organized way, which is possible through an efficient key management scheme. An ideal Broadcast Encryption scheme should defi...

Journal: :EURASIP J. Wireless Comm. and Networking 2010
Mohamed-Lamine Messai Makhlouf Aliouat Hamida Seba

Securing a wireless communication has generally a vital importance, particularly when this communication is in a hostile environment like in wireless sensor networks (WSNs). The problem is how to create cryptographic keys between sensor nodes to ensure secure communications. Limited resources of sensor nodes make a public key cryptosystem such as RSA not feasible. So, most solutions rely on a s...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت دبیر شهید رجایی - دانشکده علوم انسانی و پایه 1390

the present study aimed at investigating the relationship between iranian efl teachers’ classroom management orientations and their teaching styles. additionally, the difference between male and female teachers’ teaching styles and classroom management orientations and their relationship with experience and age were explored. three hundred efl teachers filled in attitudes and beliefs on classro...

2005
Sencun Zhu Sushil Jajodia

Multicast is an efficient technique to distribute data to a large group of users. To prevent disclosure of distributed data to unauthorized users, multicast-based applications require confidential group communication, which is achieved by encrypting data with a group-wide shared key. The group key must be updated and redistributed to all authorized users in a secure and reliable fashion wheneve...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1391

abstract global financial crisis has created too many problems in relations among governments. among these problems, the issue of global monetary management, more than every time in the past four decades, has been moved in the center of international economic attentions. a problem which is specially known with the monetary hostility between united states and public republic of china. where ar...

Journal: :CoRR 2016
Vinod Kumar S. K. Pandey Rajendra Kumar

In the secure group communication, data is transmitted in such a way that only the group members are able to receive the messages. The main problem in the solution using symmetric key is heavy re-keying cost. To reduce re-keying cost tree based architecture is used. But it requires extra overhead to balance the keytree in order to achieve logarithmic re-keying cost. The main challenging issue i...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

Journal: :I. J. Network Security 2010
Rajavelu Srinivasan V. Vaidehi Rajavelu Rajaraman S. Kanagaraj R. Chidambaram Kalimuthu R. Dharmaraj

This paper proposes a scheme to provide security to dynamic multicast VoIP systems efficiently. Security is usually provided by encrypting the media packets sent from a user to other users with the help of a shared key called the session encryption key. The most time consuming process in a dynamic multicast VoIP environment is the group key management. Whenever there is a change in the group me...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید