نتایج جستجو برای: group key

تعداد نتایج: 1484350  

2006
Sunghyuck Hong Noé Lopez-Benitez

─Group communication is becoming increasingly popular in Internet applications such as videoconferences, online chatting programs, games, and gambling. For secure communications, the integrity of messages, member authentication, and confidentiality must be provided among group members. To maintain message integrity, all group members use the Group Key (GK) for encrypting and decrypting messages...

Journal: :international journal of foreign language teaching and research 0
fazlolah samimi department of english, qeshm branch, islamic azad university, qeshm, iran rahman sahragard english department, shiraz university, shiraz, iran seyyed ayatollah razmjoo english department, shiraz university, shiraz, iran

abstract reading strategies are seen as supportive means to help learners process and comprehend english texts effectively. the present research probed to posit a discipline-specific model of reading strategies for iranian tefl postgraduate students. the motive behind developing a local model of reading strategy is twofold: first, a variety of postgraduate students admitted for m.a and ph.d. pr...

1998
Klaus Becker Uta Wille

LIMITED DISTRIBUTION NOTICE This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and spe...

2016
J. Kavitha B. Venkateswarlu

Traditional broadcast encryption (BE) schemes al-low a sender to securely broadcast to any subset of members but require a trusted party to distribute decryption keys. Group key agreement (GKA) protocols enable a group of members to negotiate a common encryption key via open networks so that only the group members can decrypt the ciphertexts encrypted under the shared encryption key, but a send...

2016
B. Deepika Dayakar Reddy

Traditional broadcast encryption (BE) schemes allow a sender to securely broadcast to any subset of members but require a trusted party to distribute decryption keys. Group key agreement (GKA) protocols enable a group of members to negotiate a common encryption key via open networks so that only the group members can decrypt the ciphertexts encrypted under the shared encryption key, but a sende...

Journal: :CoRR 2009
Eric Ke Wang Lucas Chi Kwong Hui Siu-Ming Yiu

Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual authentica...

2001
Deborah A. Agarwal Olivier Chevassut Mary R. Thompson Gene Tsudik

Many distributed applications require a secure reliable group communication system to provide coordination among the application components. This paper describes a secure group layer (SGL) which bundles a reliable group communication system, a group authorization and access control mechanism, and a group key agreement protocol to provide a comprehensive and practical secure group communication ...

2000
Jonathan Robert Stanton Yair Amir Damian Hasse Giuseppe Ateniese Yongdae Kim Cristina Nita-Rotaru Theo Schlossnagle John L. Schultz Gene Tsudik

Increasing popularity and diversity of collaborative applications prompts the need for highly secure and reliable communication platforms for dynamic peer groups. Security mechanisms for such groups tend to be both expensive and complex and their integration with reliable group communication services presents a formidable challenge. This paper discusses some important integration issues, report...

Journal: :I. J. Network Security 2015
Feng Wang Chin-Chen Chang Yeh-Chieh Chou

Group authentication and group key distribution ensure the security of group communication. Most existing schemes of group authentication and group key distribution need the assistance of a group manager. However, deciding upon a group manager can be difficult work for some practical applications, especially in an Ad Hoc network. Therefore, we proposed a group authentication and group key distr...

پایان نامه :وزارت بهداشت، درمان و آموزش پزشکی - دانشگاه علوم پزشکی و خدمات بهداشتی درمانی مشهد - دانشکده دندانپزشکی 1390

objective: the objective of this study was to investigate the invitro fluoride release of four new self-adhesive resin cements; set (sdi, australia), breeze (pentron, usa), embrace wetbond (pulpdent, usa), g-cem (gc, japan) and to assess the bonding performance of these self-adhesive resin cements for bonding of orthodontic brackets. materials and methods: for fluoride release experiment, six ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید