Access Control Scheme Based on Fuzzy Identity in Opportunistic Network
نویسندگان
چکیده
منابع مشابه
Improvement on a Fuzzy Identity-based Encryption Scheme
Sahai and Waters introduced a fuzzy id-based encryption (FIBE) scheme in which an identity was viewed as a set of descriptive attributes, and any user with a private key for an identity ID was allowed to decrypt a ciphertext encrypted with an identity ID′ , if and only if the identity ID and ID′were close to each other as measured by the “set overlap” distance metric. After that, Shweta Agrawal...
متن کاملClient-Server Access Control Method on the Policy-Based Network Management Scheme called DACS Scheme
Recently, much attention is paid to the network security including information leak through a network. As one of the important technologies about network security, there is an access control for network services. There are some methods of access control: the access control by packet filtering mechanism on the network server side, the access control by the communication control mechanism on the ...
متن کاملconstructing gender identity through narratives based on hallidays metafunctions
هویت, شکل دادن و بازنمایی آن در گفتمان, توجه بسیاری از محققان این رشته را به خود جلب کرده است. تحقیق حاضر بر شکل دادن به هویت جنسیتی هشت تن از دانشجویان ایرانی مشغول به تحصیل در دوره کارشناسی ارشد از طریق بررسی روایات آنان از تجربیات شخصی, متمرکز شده است. تحلیل داده ها در این تحقیق مشتمل بر سه بخش است: بخش اول شامل کدگذاری موضوعی روایات است که بر اساس آن هویت جنسیتی شرکت کنندگان در تحقیق بر اسا...
15 صفحه اولA Direction Entropy-Based Forwarding Scheme in an Opportunistic Network
In an opportunistic network, one of the most challenging issues is the equilibrium of the network traffic and transmission delay for forwarding messages. To resolve this problem, we propose a new forwarding scheme, called the direction entropy-based forwarding scheme (DEFS), using the main direction and direction entropy based on the information collected about the directions of the nodes in th...
متن کاملHotspot: Location-based Forwarding Scheme in an Opportunistic Network
In an opportunistic network (OPPNET), the forwarding schemes for adhoc networks are not applicable since there is no complete path between the source and the destination node and relay nodes should store messages when no forwarding opportunity exists. Recently several proper schemes have been proposed in an OPPNET. Among them, floodingbased schemes result in very high network traffic and low tr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2018
ISSN: 1877-0509
DOI: 10.1016/j.procs.2018.04.278