نتایج جستجو برای: rekeying

تعداد نتایج: 186  

Journal: :Journal of Pragmatics 2021

Using the method and theoretical perspective of language socialization, this paper examines pragmatic reframing infant behavior from distress to playfulness among !Xun San north–central Namibia. Reframing mobilizes a constellation multiple semiotic resources. For !Xun, central these resources is “gymnastic behavior,” namely, holding infants upright or moving them up down (bouncing). The analysi...

Journal: :IACR transaction on symmetric cryptology 2023

Encrypting too much data using the same key is a bad practice from security perspective. Hence, it customary to perform re-keying after given amount of transmitted. While in many cases, done fresh execution some exchange protocol (e.g., IKE or TLS), there are scenarios where internal re-keying, i.e., without information, performed, mostly due performance reasons.Originally suggested by Abdalla ...

2004
Shaoquan Jiang Guang Gong

Multi-service oriented broadcast encryption is a mechanism that allows a center to securely distribute multiple services to its authorized users. In this paper, we suggest a framework called M framework from the subset cover method [12] using RSA exponentiation technique. In this framework, each user’s secret storage is independent of the number of services. Service subscriptions and service pr...

2003
Mana Taghdiri Daniel Jackson

This paper describes the analysis of Pull-Based Asynchronous Rekeying Framework (ARF), a recently proposed solution to the scalable group key management problem in secure multicast. A model of this protocol is constructed in Alloy, a lightweight relational modeling language, and analyzed using the Alloy Analyzer, a fully automatic simulation and checking tool for Alloy models. In this analysis,...

2014
G. Babu R. Balamurugan

Mobile ad-hoc Network (MANET) is collection of mobile platforms that form a dynamic infrastructure communication network wherever required. Until recently, Mobile nodes formed a group communication, even for communication there is a problem of efficient and securely broadcast from sender to remote cooperative group occurs in many emerging applications. In Existing consider several distributed c...

2012
Vibha Indira Gandhi Neha Bhatnagar Indira Gandhi Sakshi Gupta

In recent years, group-oriented applications and collaborative protocols are gaining popularity. This calls for group key management which forms the basic building block in achieving secure group communication. The points that differentiate it from the traditional communication are that they do not have a centralized server but a distributed system, group key being contributory and dynamic natu...

Journal: :IACR Cryptology ePrint Archive 2015
Nicky Mouha Atul Luykx

At ASIACRYPT 1991, Even and Mansour introduced a block cipher construction based on a single permutation. Their construction has since been lauded for its simplicity, yet also criticized for not providing the same security as other block ciphers against generic attacks. In this paper, we prove that if a small number of plaintexts are encrypted under multiple independent keys, the Even-Mansour c...

2016
M. Sandhya Rani

A Mobile Adhoc Network (MANET) is a collection of autonomous nodes that communicate with each other ,most frequently using a multi-hop wireless network. Secure and multicast group communication is an active area of research in MANETS. The main problem in secure group communication is group dynamics and key management. Group key management is crucial for multicast security. Member joining and me...

1998
Ohad Rodeh Kenneth P. Birman Mark Hayden Zhen Xiao Danny Dolev

Ensemble is a Group Communication System built at Cornell and the Hebrew Universities. It allows processes to create process groups in which scalable reliable fo-ordered multicast and point-to-point communication are supported. The system also supports other communication properties, such as multicast causal and total ordering, ow control, etc. This paper describes the security protocols and in...

2014
Y. Kumar A. Nageswara Rao

In near future, the Wireless Sensor Networks (WSN) is widely used in many applications like military and civil domains. The wireless sensor networks are always deployed in hostile and pervasive environment. Security is major concern in the wireless sensor network. The traditional network security methods are not suitable for wireless sensor networks because of limited resource. Several Key mana...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید