نتایج جستجو برای: rekeying
تعداد نتایج: 186 فیلتر نتایج به سال:
Wireless sensor networks (WSNs) consist of many small sensor nodes and are commonly used to collect data and monitor hostile environments. Due to the factor of the cost, sensor nodes are lack of tamper-resistance and are deployed in unattended environments. Sensor nodes are easily captured by an intruder and compromised. An intruder will extract the secret elements in the sensor nodes including...
Group communication is a suitable and effective communication model for large-scale distributed systems.To be fully exploitable, group communication must be protected.This is normally achieved by providing members with a group key which is revoked and redistributed upon every member’s joining (backward security) or leaving (forward security). Such a rekeying process must be efficient and highly...
In this paper, we focus on the problem of secure multicast in dynamic groups. In this problem, a group of users communicate using a shared group key. Due to the dynamic nature of these groups, to preserve secrecy, it is necessary to change the group key whenever the group membership changes. While the group key is being changed, the group communication needs to be interrupted until the rekeying...
We present a hybrid group key management protocol that incorporates both a centralized and a contributory scheme for key management, and a tree-based Elliptic Curve Diffie-Hellman technique for group key updates. It combines the advantage of the centralized approach’s efficiency and the contributory scheme’s fault tolerance. In addition, our rekeying algorithm updates the group key in the prese...
Cognitive radio based networks can resolve the spectrum scarcity issues present in the current emergency communication networks. Establishing quick and secure communication between rescue team members in the disaster field is a significant task and cognitive radio MANETs are the best choice for disaster management and other emergency situations. This paper presents a scalable group key agreemen...
In this paper, we focus on the problem of secure multicast in dynamic groups. In this problem, a group of users communicate using a shared key. Due to the dynamic nature of these groups, to preserve secrecy, it is necessary to change the group key whenever the group membership changes. While the group key is being changed, the group communication needs to be interrupted until the rekeying is co...
Two types of tweakable blockciphers based on classical blockciphers have been presented over the last years: non-tweak-rekeyable and tweak-rekeyable, depending on whether the tweak may influence the key input to the underlying blockcipher. In the former direction, the best possible security is conjectured to be 2, where n is the size of the blockcipher and σ is the number of blockcipher calls. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید