نتایج جستجو برای: rekeying

تعداد نتایج: 186  

2016
G. Sankara Rao

In Wireless networks, nodes can communicate through base stations. In this scenario, the communication process takes more time to complete. To reduce this delay time, a Mobile Ad hoc Network is introduced. A Mobile ad hoc Network (MANET) is an infrastructure less network. In this, each node acts as a base station and is responsible for dynamically discovering other nodes it can directly communi...

Journal: :Computer systems science and engineering 2022

Group communication is widely used by most of the emerging network applications like telecommunication, video conferencing, simulation applications, distributed and other interactive systems. Secured group plays a vital role in case providing integrity, authenticity, confidentiality, availability message delivered among members with respect to communicate securely between inter or else within g...

Journal: :I. J. Network Security 2016
Depeng Li Srinivas Sampalli

Contributory group key management schemes are popularly used for dynamic peer group communications in collaborative environments. Previous contributory group key management schemes require every group member to perform a number of expensive Diffie-Hellman operations whenever the group membership changes. This is not always affordable for devices in resource-constrained networks. In this paper, ...

Journal: :I. J. Network Security 2008
Qingyu Zhang Kenneth L. Calvert

The Logical Key Hierarchy (LKH) provides a scalable and efficient way to distribute session keys to authorized group members in secure group (multicast) communication. However, because multicast is a best-effort service, it requires additional mechanism to ensure that every member receives the rekey information. To solve this problem, several FEC-based schemes have been proposed. Although these...

2014

Multicasting is a service that delivers data from a source to a group of recipients which reduces the network’s bandwidth and also the transmission overhead in the sender. Privacy and authentication must be ensured in multicast distribution for applications, where it is important to restrict the set of receivers and authenticate the data source. Key management plays a significant role to ensure...

2011
D. Manivannan Matthew Moyer Yong dae Kim Adrian Perrig

In today‟s world of internet, secure communication among group of members has become vital, where multicasting plays an important role. In secure multicasting, security and scalability are the two important checks. Sometimes there is tradeoff between security and scalability. In order to transmit the data in a secure and scalable way, a suitable key management protocol should be implemented whi...

Journal: :JCP 2014
Qiuna Niu

With the popularity of group-oriented applications, secure and efficient communication among all group members has become a major issue. An efficient key management mechanism is the base and critical technology of secure group communications. A distributed grouporiented key management scheme without the participation of third parties is proposed in the paper. The scheme deploys Elliptic Curve D...

Journal: :Journal of Systems and Software 2007
Patrick P. C. Lee John C. S. Lui David K. Y. Yau

We present the SEcure communicAtion Library (SEAL), a Linux-based C language application programming interface (API) library that implements secure group key agreement algorithms that allow a communication group to periodically renew a common secret group key for secure and private communication. The group key agreement protocols satisfy several important characteristics: distributed property (...

2014
Neha Mittal Vinod Kumar

The today’s world relies heavily over the applications, such as e-commerce, which are using the multicast communications, carried out over the insecure channel like internet, henceforth, the need for secure group communication is realized. The secure group communication helps in transmitting data in such a way that only the members of the group are able to receive the message. In 2012, K. Sarav...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید