نتایج جستجو برای: group key

تعداد نتایج: 1484350  

Journal: :CoRR 2016
Peter Gutmann Steven M. Bellovin Matt Blaze Ronald L. Rivest Nigel P. Smart

This paper presents a new crypto scheme whose title promises it to be so boring that no-one will bother reading past the abstract. Because of this, the remainder of the paper is left blank.

Journal: :CoRR 2016
Juan Antonio López-Ramos Joachim Rosenthal Davide Schipani Reto Schnyder

A new proposal for group key exchange is introduced which proves to be both efficient and secure and compares favorably with state of the art protocols.

2009
Ting Yuan Jianqing Ma Yiping Zhong Shiyong Zhang

The most common solution for implementing access control into a dynamic group is to use a group key unknown to all but the users in the group. The group key (i.e., session key) is updated for every session throughout the lifetime of the group with the procedure of group key distribution. In this paper, we propose a group key distribution scheme with self-healing property that enables users in a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - پژوهشکده علوم انسانی و اجتماعی 1390

this study attempts to investigate the effect of peers’ revision in comparison to that of the teacher, and whether peers’ comments and teachers’ comments facilitate students’ revision? if yes, which one is more effective? also attempts have been made to see which aspects of language are more highlighted by peers versus teachers when commenting. besides, it is investigating the student’s attitud...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی 1391

abstract this study set out to compare the effect of modality of presentation (subtitled vs. auditory) in the comprehension of verbal content of documentary films among iranian efl students. to this end, (30 male 30 female) students were chosen from two schools. after their homogeneity was established, the students attended the listening sessions to watch five documentary films over t...

پایان نامه :دانشگاه تربیت معلم - سبزوار - دانشکده ادبیات و علوم انسانی 1389

abstract this study aimed at investigating the impact of etymology strategy instruction on the development of vocabulary of iranian intermediate efl learners. etymology, knowledge of origin of words, roots, and affixes, has proved to be a controversial issue and a question of long debate with regard to its impact on the process of vocabulary learning. this study employed etymology strategy in ...

2005
Shanyu Zheng Stephen S. Lee

Traditional analysis of group key protocol performance is based on the cost of performing a single operation. We extend this analysis to examine the performance behavior of five group key protocols after execution of multiple operation. This paper reports the results of our experiments for 100 operations consist of combinations of join, leave, mass add and mass leave operations. The results of ...

Journal: :CoRR 2010
Qingfeng Cheng Chuangui Ma

In AFRICACRYPT 2010, Abdalla et al. first proposed a slight modification to the computations steps of the BD protocol, called mBD+P. Then they extended mBD+P protocol into mBD+S protocol. In this paper, we show that both of mBD+P and mBD+S protocols are vulnerable to malicious insiders attack. Further, we propose a simple countermeasure against this attack.

Journal: :J. Inform. and Commun. Convergence Engineering 2010
Jiun-Hau Liew Ivy Ong Sanggon Lee Hyotaek Lim Hoon-Jae Lee

549 Abstract— Lim et al. proposed a Hybrid Group Key Management scheme for Hierarchical Self-Organizing Sensor Network in 2008 to provide a secure way to pass down the group key for cluster-based communication. This paper presents two practical attacks on the scheme proposed by Lim et al. by tampering sensor nodes of a cluster to recover necessary secret keys and by exploiting the IDS employed ...

Journal: :IEICE Transactions 2009
Mark Manulis Koutarou Suzuki Berkant Ustaoglu

Recent advances in the design and analysis of secure two-party key exchange (2KE) such as the leakage of ephemeral secrets used during the attacked sessions remained unnoticed by the current models for group key exchange (GKE). Focusing on a special case of GKE — the tripartite key exchange (3KE) — that allows for efficient one-round protocols, we demonstrate how to incorporate these advances t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید