نتایج جستجو برای: efficient groups

تعداد نتایج: 1146661  

Journal: :I. J. Network Security 2006
Liming Wang Chuan-Kun Wu

Secure multicast represents the core component of many web and multimedia applications such as pay-TV, teleconferencing, real-time distribution of stock market price and etc. The main challenges for secure multicast is scalability, efficiency and authenticity. In this paper, we propose a scalable, efficient, authenticated group key agreement scheme for large and dynamic multicast systems. The p...

2006
Iftekhar Ibne Basith

To allow or protect the traffic in any network security system like firewalls and Intrusion Prevention System (IPS), a packet classification scheme is used along with the application of TCAM-based flow identification [1]. But these applications share a common demand, which is the ability to process, maintain, and correlate huge amount of events. In these applications, the rate of the events is ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده ادبیات و زبانهای خارجی 1387

the present study is an experimental case study which investigates the impacts, if any, of skopos on syntactic features of the target text. two test groups each consisting of 10 ma students translated a set of sentences selected from advertising texts in the operative and informative mode. the resulting target texts were then statistically analyzed in terms of the number of words, phrases, si...

Journal: :Angewandte Chemie 2006
Dominik Wöll Julia Smirnova Wolfgang Pfleiderer Ulrich E Steiner

DNA chips are widely used for genomic analysis. Currently, high-density DNA chips can be synthesized with up to several hundred thousand different spots on an area of 1 cm. In principle, the complete human genome can be probed with such a chip. The required high spot densities can be achieved by photolithographic in situ DNA-chip synthesis. In this method, the oligonucleotides are synthesized s...

1998
Germano Caronni Marcel Waldvogel Dan Sun Bernhard Plattner

Proposals for multicast security that have been published so far are complex, often require trust in network components or are inefficient. In this paper we propose a series of novel approaches for achieving scalable security in IP multicast, providing group-wide privacy and authentication. They can be employed to efficiently secure multi-party applications where members of highly dynamic group...

Journal: :Computer and Information Science 2011
Thanongsak Aneksrup Pipat Hiranvanichakorn

The security issues in ad hoc network are increasingly important. In this paper, we propose a distributed key management what approach by using braid groups and key tree. Without any assumption of prefixed trust relationship between nodes, the proposed method works in a self-organizing way to provide the key management services. The using of the proposed tree-based braid groups has following ad...

2014
Valentin Robu Meritxell Vinyals Alex Rogers Nicholas R. Jennings

Current electricity tariffs do not reflect the real cost that customers incur to suppliers, as units are charged at the same rate, regardless of how predictable each customer’s consumption is. A recent proposal to address this problem are prediction-of-use tariffs. In such tariffs, a customer is asked in advance to predict her future consumption, and is charged based both on her actual consumpt...

2004
Michael T. Goodrich Jonathan Z. Sun Roberto Tamassia

We study the problem of broadcasting confidential information to a collection of n devices while providing the ability to revoke an arbitrary subset of those devices (and tolerating collusion among the revoked devices). In this paper, we restrict our attention to low-memory devices, that is, devices that can store at most O(log n) keys. We consider solutions for both zero-state and low-state ca...

1997
Supratik Bhattacharyya James F. Kurose Don Towsley Ramesh Nagarajan

Controlling the rate of multicast data transfer to a large number of receivers is difficult, due to the heterogeneity among the end-systems’ capabilities and their available network bandwidth. If the data transfer rate is too high, certain receivers will lose data, and retransmissions will be required. If the data transfer rate is too slow, an inordinate amount of time will be required to trans...

2004
Kui Ren Hyunrok Lee Kwangjo Kim Taewhan Yoo

Group key management presents a fundamental challenge in secure dynamic group communications. In this paper, we propose an efficient group authenticated key agreement protocol (EGAKA), which is designed to be fully distributed and fault-tolerant, provides efficient dynamic group membership management, mutual authentication among group members and is secure against both passive and active attack...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید