نتایج جستجو برای: group key management

تعداد نتایج: 2218760  

2006
Shanyu Zheng David Manz Yuzhe Chen

Several group key protocols have been presented in the literature to enable secrecy of communication among dynamic groups of participants. However, there is a lack of consistency in the literature in terms of operations supported and performance metrics of the various protocols. This makes it difficult for designers to choose the best protocol for their specific applications. To alleviate this ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه دریانوردی و علوم دریایی چابهار - دانشکده ادبیات و زبانهای خارجی 1390

abstract cooperative learning refers to small groups of learners working together as a team to solve a problem, complete a task, or accomplish a common goal. in a cooperative environment one’s success is directly related to the success of other members because the focus on the individual shifts towards the group. to test the effectiveness of the method, using jigsaw technique, a study was cond...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سمنان - دانشکده علوم انسانی 1393

learning-oriented assessment seeks to emphasise that a fundamental purpose of assessment should be to promote learning. it mirrors formative assessment and assessment for learning processes. it can be defined as actions undertaken by teachers and / or students, which provide feedback for the improvement of teaching and learning. it also contrasts with equally important measurement-focused appro...

2007
Zinaida Benenson

This report presents an overview over secure group communication paradigms in ad hoc networks, with especial attention to join and leave algorithms. Although classical group communication, after more than 25 years of development, is by now well understood and formalized, group communication for ad hoc networks is still under development. Firstly, the paradigm of groups in distributed computing ...

2005
Shanyu Zheng Jim Alves-Foss Stephen S. Lee

A few group key protocols are analyzed, implemented and deployed, but the costs associated with them have been poorly understood. Their analysis of group key agreements performance is based on the cost of performing a single operation. In this paper we extend this analysis to examine the performance behavior of five group key protocols after execution of multiple operation. We report our experi...

2002
Sencun Zhu Sanjeev Setia Sushil Jajodia

Scalable group rekeying is one of the biggest challenges that need to be addressed to support secure communications for large and dynamic groups. In recent years, many group key management approaches based on the use of logical key trees have been proposed to address this issue. Using logical key trees reduces the complexity of group rekeying operation from O(N) to O(logN), where N is the group...

Journal: :CoRR 2016
Juan Antonio López-Ramos Joachim Rosenthal Davide Schipani Reto Schnyder

A new proposal for group key exchange is introduced which proves to be both efficient and secure and compares favorably with state of the art protocols.

Journal: :Perform. Eval. 2011
Jin-Hee Cho Ing-Ray Chen

We develop a mathematical model to quantitatively analyze a scalable region-based hierarchical group key management protocol integrated with intrusion detection to deal with both outsider and insider security attacks for group communication systems (GCSs) inmobile ad hoc networks (MANETs). Our proposed adaptive intrusion detection technique is based on majority voting by nodes in a geographical...

2003
Claudiu Duma

An ever-increasing number of Internet applications, such as content and software distribution, distance learning, multimedia streaming, teleconferencing, and collaborative workspaces, need efficient and secure multicast communication. However, efficiency and security are competing requirements and balancing them to meet the application needs is still an open issue. In this thesis we study the e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید