نتایج جستجو برای: rekeying
تعداد نتایج: 186 فیلتر نتایج به سال:
The problem of'controlling access to multimedia multicasts requires the distribution and maintenance of keying information. The conventional approach to distributing keys is to use a channel independent of the multimedia content. We propose a second approach that involves the use of an data-dependent channel, and can be achieved for multimedia by using data embedding techniques. Using data embe...
Key management in the ad hoc network is a challenging issue concerning the security of the group communication. Group key management protocols can be approximately categorized into three: centralized, decentralized, and distributed. The much apt solution to provide the services like authentication, data integrity and data confidentiality is the establishment of a key management protocol. This p...
Secure group communication is a paradigm that primarily designates one-to-many communication security. The proposed works relevant to secure group communication have predominantly considered the whole network as being a single group managed by a central powerful node capable of supporting heavy communication, computation and storage cost. However, a typical Wireless Sensor Network (WSN) may con...
the computer industry has defined the ieee 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. as the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. ieee 802.16e uses multica...
Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complexity) solution for feasible frequent symmetric key exchange in adhoc networks, based on a Tree Parity Machine Rekeying Architecture. A key exchange can be performed within a few milliseconds, given practical wireless com...
Since communication signals are publicly exposed while they transmit across space, Ad Hoc Networks (MANETs) where secured is most crucial. Unfortunately, these systems more open to intrusions that range from passive listening aggressive spying. A Hybrid Team centric Re-Key Control Framework (HT-RCF) suggests this research examines private group in Adhoc environments. Each selects a Group Manage...
An ever-increasing number of Internet applications, such as content and software distribution, distance learning, multimedia streaming, teleconferencing, and collaborative workspaces, need efficient and secure multicast communication. However, efficiency and security are competing requirements and balancing them to meet the application needs is still an open issue. In this thesis we study the e...
Wireless sensor networks (WSNs) have been envisioned to be very useful for a broad spectrum of emerging civil and military applications (Akyildiz et al., 2002). However, sensor networks are also confronted with many security threats such as node compromise, routing disruption and false data injection, because they are normally operated in an unattended, harsh or hostile environment. Among all t...
The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...
Component-based design is gaining attention as a potentially feasible approach to software reuse. An important aspect of this reuse potential lies in the possibility of turning existing applications into functionally rich, reusable components and, thereby, preserving the investment in legacy systems. Based on fieldwork in a software development company where this practice has been adopted, this...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید