نتایج جستجو برای: random key pre distribution

تعداد نتایج: 1636984  

2010
Avinash Kumar Chaurasia R. K. Ghosh

In this paper we propose a light-weight random key pre-distributed scheme based on deployment knowledge. It uses only one hop for key distribution. It leads to a substantial reduction in energy requirement while improving key sharing and resilience factor compared to the scheme proposed in [1]. We develop the theoretical background of the proposed scheme and explain why the proposed scheme perf...

Journal: :CoRR 2011
José Antonio Álvarez-Bermejo Juan Antonio López-Ramos Joachim Rosenthal Davide Schipani

In this paper we propose a new protocol to manage multicast key distribution. The protocol is based on the use of orthogonal systems in vector spaces. The main advantage in comparison to other existing multicast key management protocols is that the length and the number of the messages which have to be sent are considerably smaller. This makes the protocol especially attractive when the number ...

Journal: :CoRR 2011
Anvesh Reddy Aileni

Wireless sensor networks consist of sensor nodes with limited computational and communication capabilities. This paper deals with mobile sensors which are divided into clusters based on their physical locations. Efficient ways of key distribution among the sensors and inter and intra cluster communications are examined. The security of the entire network is considered through efficient key mana...

پایان نامه :دانشگاه تربیت معلم - سبزوار - دانشکده ادبیات و علوم انسانی 1391

abstract this study evaluates the iranian pre-university english textbook in terms of needs, objectives, content, and methodology. the study was designed on the qualitative- quantitative survey basis using interviews and questionnaires, a researcher-made textbook evaluation checklist and a needs analysis questionnaire. the textbook evaluation questionnaire was used in this study to elicit the ...

2005
Jooyoung Lee Douglas R. Stinson

We revisit a key agreement scheme presented by Leighton and Micali [11], generalize the scheme, and present a new framework of tree-based key distribution pattern (TKDP). We presents a method of constructing TKDPs from cover-free families. We show the existence of TKDPs by probabilistic method. We can reduce the upper bounds on the minimum number of rows of (t, w, T )-TKDPs, which are obtained ...

Journal: :IACR Cryptology ePrint Archive 2012
Ivan Damgård Marcel Keller Enrique Larraia Valerio Pastro Peter Scholl Nigel P. Smart

SPDZ (pronounced “Speedz”) is the nickname of the MPC protocol of Damgård et al. from Crypto 2012. SPDZ provided various efficiency innovations on both the theoretical and practical sides compared to previous work in the preprocessing model. In this paper we both resolve a number of open problems with SPDZ; and present several theoretical and practical improvements to the protocol. In detail, w...

H. Haj Seyyed Javadi I. Qasemzadeh Kolagar M. Anzani

Wireless sensor networks are composed of very small devices, called sensor nodes,for numerous applications in the environment. In adversarial environments, the securitybecomes a crucial issue in wireless sensor networks (WSNs). There are various securityservices in WSNs such as key management, authentication, and pairwise keyestablishment. Due to some limitations on sensor nodes, the previous k...

Journal: :CoRR 2011
Travis Denny

Leveraging quantum mechanics, cryptographers have devised provably secure key sharing protocols[4], [3], [6], [17]. Despite proving the security in theory, real-world application falls short of the ideal. Last year, cryptanalysts completed an experiment demonstrating a successful eavesdropping attack on commercial quantum key distribution (QKD) systems[12]. This attack exploits a weakness in th...

2008
Shuhua Wu Yuefei Zhu

Key establishment protocols are used for distributing shared keying material in a secure manner. In 1995, Bellare and Rogaway presented a three-party server-based key distribution (3PKD) protocol. But the protocol was recently found insecure and then was fixed by Raymond Choo et al.. But forward-secrecy is not considered in the revised protocol. In this paper, we demonstrate that it is not forw...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید