نتایج جستجو برای: group key management

تعداد نتایج: 2218760  

2010
Ning Shang Mohamed Nabeel Elisa Bertino Xukai Zou

Secure collaborative applications currently enabled by the Internet need flexible and efficient mechanisms for managing and distributing group keys. The secure transmission of information among collaborating users should be efficient as well as flexible in order to support access control models with different granularity levels for different kinds of applications such as secure group communicat...

1998
Kanta Matsuura Yuliang Zheng Hideki Imai

In an open network such as the Internet, multicast security services typically start with group session-key distribution. Considering scalability for group communication among widely-distributed members, we can find a currently-leading approach based on a CBT (Core-Based Tree) routing protocol, where Group Key Distribution Centers (GKDCs) are dynamically constructed during group-member joining ...

Journal: :Comput. Sci. Inf. Syst. 2013
Inshil Doh Jiyoung Lim Kijoon Chae

In mobile open Internet Protocol TV (IPTV) which is one of the major attracting technologies recently, the security is a key issue for reliable service, because the mobility and the openness in IPTV could cause much more vulnerabilities to various attacks compared with traditional IPTV services. In this paper, we propose an energyefficient and secure channel group key establishment and rekeying...

2007
Hung-Min Sun Shuai-Min Chen Ying-Chu Hsiao Yue-Hsun Lin Frank Chee-Da Tsai

The Relay Task Group of IEEE 802.16 has developed IEEE 802.16j which supports mobile multi-hop relay (MMR). MMR utilizes relay stations (RS) to extend network capability. Since attacks are easy to mount in wireless interface between RSs and BS, security issues seem to be more important. This paper proposes a group key management scheme that agrees with the Security Zone Key (SZK) specified in I...

2003
Ahmet M. Eskicioglu Scott D. Dexter Edward J. Delp

Security is an increasingly important attribute for multimedia applications that require prevention of unauthorized access to copyrighted data. Two approaches have been used to protect scalable video content in distribution: Partial encryption and progressive encryption. Partial encryption provides protection for only selected portions of the video. Progressive encryption allows transcoding wit...

Journal: :JCS 2014
Nafeesa Begum Jeddy Krishnan Kumar V. Sumathy

Hierarchical Access Control in group communication is an active area of research which is difficult to achieve it. Its primary objective is to allow users of a higher authority group to access information or resource held by lower group users and preventing the lower group users to access information held by higher class users. Large collection of collaborative applications in organizations inh...

2013
V K Singh Kalpana Sharma

Keying technique in Wireless Sensor Networks(WSNs) is one of the most emerging fields of WSN security. In order to provide security on WSN, the role of Key distribution technique is considered to be very significant and thus the key management plays a crucial and fundamental roles in the security service of WSNs. This paper reviews pairwise key establishment technique along with the architectur...

2007
Hyewon Park Kyusuk Han Chan Yeob Yeun Kwangjo Kim

In modern network computing, authenticated group key agreement (AGKA) is important for conferencing. After Shamir [2] proposed the ID-based cryptosystem in 1984, the various applications on the ID-based cryptosystem have been actively studied, due to the simple key management complexity. For the AGKA, Choi et al. [16] proposed an ID-based authenticated group key agreement with bilinear maps, wh...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده ادبیات و علوم انسانی 1392

abstract the present study was conducted in order to investigate the impact of an integrated model of form-focused and task-based instruction on iranian efl learners vocabulary learning and retention.it also aimed to detect efl learners attitude towards the implementation of form-focused task-based vocabulary instruction in the classroom. in order to address the purposes of this study, a sampl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید