نتایج جستجو برای: toppling free fall shearing key group method
تعداد نتایج: 3355041 فیلتر نتایج به سال:
Background and Objective: Prostate cancer is a prevalent disease around the world. The prostatic specific Antigen (PSA) test has recently proved itself as a useful method for the diagnosis and examination of patients with prostatic cancer. The objective of this study was to compare the stability of free PSA and total PSA in different storage settings. Materials and Method...
We present a new method for measuring the spectral phase of ultrashort pulses that utilizes spectral shearing interferometry with zero delay. Unlike conventional spectral phase interferometry for direct electric-field reconstruction, which encodes phase as a sensitively calibrated fringe in the spectral domain, two-dimensional spectral shearing interferometry robustly encodes phase along a seco...
Traditional analysis of group key protocol performance is based on the cost of performing a single operation. We extend this analysis to examine the performance behavior of five group key protocols after execution of multiple operation. This paper reports the results of our experiments for 100 operations consist of combinations of join, leave, mass add and mass leave operations. The results of ...
In AFRICACRYPT 2010, Abdalla et al. first proposed a slight modification to the computations steps of the BD protocol, called mBD+P. Then they extended mBD+P protocol into mBD+S protocol. In this paper, we show that both of mBD+P and mBD+S protocols are vulnerable to malicious insiders attack. Further, we propose a simple countermeasure against this attack.
549 Abstract— Lim et al. proposed a Hybrid Group Key Management scheme for Hierarchical Self-Organizing Sensor Network in 2008 to provide a secure way to pass down the group key for cluster-based communication. This paper presents two practical attacks on the scheme proposed by Lim et al. by tampering sensor nodes of a cluster to recover necessary secret keys and by exploiting the IDS employed ...
Recent advances in the design and analysis of secure two-party key exchange (2KE) such as the leakage of ephemeral secrets used during the attacked sessions remained unnoticed by the current models for group key exchange (GKE). Focusing on a special case of GKE — the tripartite key exchange (3KE) — that allows for efficient one-round protocols, we demonstrate how to incorporate these advances t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید