نتایج جستجو برای: group key
تعداد نتایج: 1484350 فیلتر نتایج به سال:
The aim of this technical report is to complement the work in [To et al. 2014] by proposing a Group Key Exchange protocol so that the Querier and TDSs (and TDSs themselves) can securely create and exchange the shared key. Then, the security of this protocol is formally proved using the game-based model. Finally, we perform the comparison between this protocol and other related works.
In this work, we introduce an active attack on a Group Key Exchange protocol by Burmester and Desmedt. The attacker obtains a copy of the shared key, which is created in a collaborative manner with the legal users in a communication group.
Several group key protocols have been presented in the literature to enable secrecy of communication among dynamic groups of participants. However, there is a lack of consistency in the literature in terms of operations supported and performance metrics of the various protocols. This makes it difficult for designers to choose the best protocol for their specific applications. To alleviate this ...
abstract cooperative learning refers to small groups of learners working together as a team to solve a problem, complete a task, or accomplish a common goal. in a cooperative environment one’s success is directly related to the success of other members because the focus on the individual shifts towards the group. to test the effectiveness of the method, using jigsaw technique, a study was cond...
learning-oriented assessment seeks to emphasise that a fundamental purpose of assessment should be to promote learning. it mirrors formative assessment and assessment for learning processes. it can be defined as actions undertaken by teachers and / or students, which provide feedback for the improvement of teaching and learning. it also contrasts with equally important measurement-focused appro...
A few group key protocols are analyzed, implemented and deployed, but the costs associated with them have been poorly understood. Their analysis of group key agreements performance is based on the cost of performing a single operation. In this paper we extend this analysis to examine the performance behavior of five group key protocols after execution of multiple operation. We report our experi...
Various network applications require sending data onto one or many members, maintaining security in the large groups is one of the major obstacles for controlling access. Unfortunately, IP multicast is not providing any security over the group communication. Group key management is a fundamental mechanism for secured multicast. This paper presents relevant group key management protocols. Then, ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید