نتایج جستجو برای: group key management

تعداد نتایج: 2218760  

Journal: :International Journal of Security and Networks 2009

Journal: :International journal of recent technology and engineering 2022

The group key management technique is an important for cryptographic applications. In this paper, we implemented our proposed method [1] on a protocol communication. authenticated distribution mechanism distributing key. We also discussed security analysis and attacks in active passive adversary model. Also, it ensures semantic as well Key freshness of the Along with this, they provide implicit...

2001
Thomas Hardjono Hugh Harney Brian Weis

This document presents an ISAMKP Domain of Interpretation (DOI) for group key management to support secure group communications. The "GDOI" incorporates the definition of a Phase 1 SA of the Internet DOI, and proposes new payloads and exchanges according to the ISAKMP standard. The GDOI manages group security associations, which are used by IPSEC and potentially other data security protocols ru...

2002
Michael Steiner

As a result of the increased popularity of group-oriented applications and protocols, group communication occurs in many different settings: from network multicasting to application layer teleand video-conferencing. Regardless of the application environment, security services are necessary to provide communication privacy and integrity. This thesis considers the problem of key management in a s...

Journal: :CoRR 2015
Quoc-Cuong To Benjamin Nguyen Philippe Pucheral

The aim of this technical report is to complement the work in [To et al. 2014] by proposing a Group Key Exchange protocol so that the Querier and TDSs (and TDSs themselves) can securely create and exchange the shared key. Then, the security of this protocol is formally proved using the game-based model. Finally, we perform the comparison between this protocol and other related works.

Journal: :CoRR 2016
Mohamed Baouch Juan Antonio López-Ramos Reto Schnyder Blas Torrecillas

In this work, we introduce an active attack on a Group Key Exchange protocol by Burmester and Desmedt. The attacker obtains a copy of the shared key, which is created in a collaborative manner with the legal users in a communication group.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید