نتایج جستجو برای: rekeying
تعداد نتایج: 186 فیلتر نتایج به سال:
In Wireless networks, nodes can communicate through base stations. In this scenario, the communication process takes more time to complete. To reduce this delay time, a Mobile Ad hoc Network is introduced. A Mobile ad hoc Network (MANET) is an infrastructure less network. In this, each node acts as a base station and is responsible for dynamically discovering other nodes it can directly communi...
Group communication is widely used by most of the emerging network applications like telecommunication, video conferencing, simulation applications, distributed and other interactive systems. Secured group plays a vital role in case providing integrity, authenticity, confidentiality, availability message delivered among members with respect to communicate securely between inter or else within g...
Contributory group key management schemes are popularly used for dynamic peer group communications in collaborative environments. Previous contributory group key management schemes require every group member to perform a number of expensive Diffie-Hellman operations whenever the group membership changes. This is not always affordable for devices in resource-constrained networks. In this paper, ...
The Logical Key Hierarchy (LKH) provides a scalable and efficient way to distribute session keys to authorized group members in secure group (multicast) communication. However, because multicast is a best-effort service, it requires additional mechanism to ensure that every member receives the rekey information. To solve this problem, several FEC-based schemes have been proposed. Although these...
Multicasting is a service that delivers data from a source to a group of recipients which reduces the network’s bandwidth and also the transmission overhead in the sender. Privacy and authentication must be ensured in multicast distribution for applications, where it is important to restrict the set of receivers and authenticate the data source. Key management plays a significant role to ensure...
In today‟s world of internet, secure communication among group of members has become vital, where multicasting plays an important role. In secure multicasting, security and scalability are the two important checks. Sometimes there is tradeoff between security and scalability. In order to transmit the data in a secure and scalable way, a suitable key management protocol should be implemented whi...
With the popularity of group-oriented applications, secure and efficient communication among all group members has become a major issue. An efficient key management mechanism is the base and critical technology of secure group communications. A distributed grouporiented key management scheme without the participation of third parties is proposed in the paper. The scheme deploys Elliptic Curve D...
We present the SEcure communicAtion Library (SEAL), a Linux-based C language application programming interface (API) library that implements secure group key agreement algorithms that allow a communication group to periodically renew a common secret group key for secure and private communication. The group key agreement protocols satisfy several important characteristics: distributed property (...
The today’s world relies heavily over the applications, such as e-commerce, which are using the multicast communications, carried out over the insecure channel like internet, henceforth, the need for secure group communication is realized. The secure group communication helps in transmitting data in such a way that only the members of the group are able to receive the message. In 2012, K. Sarav...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید