نتایج جستجو برای: group key management
تعداد نتایج: 2218760 فیلتر نتایج به سال:
In 2012, Piao et al. proposed a polynomial-based key management for secure intra-group and inter-group communication. In this notes, we point out that there are some security weaknesses of Piao et al.’s intra-group key distribution scheme. One main problem is that their scheme cannot prevent a group member to obtain other members’ secret keys shared with the controller. In addition, their schem...
Secure group communication systems become more and more important in many emerging network applications. For a secure group communication system, an efficient and robust group key management approach is essential. In this paper, a new group key management approach with a group controller GC using the theory of hyper-sphere is developed, where a hyper-sphere is constructed for the group and each...
Today, we face a growing interest in distributed businessto-business applications using the Internet as communication media. However, the involved security threats are often neglected in the design of such systems. In this paper, we present our security architecture for an Internet based virtual trading community. Our solution has been designed for an heterogeneous, distributed workflow managem...
Services in MANETs tend to be decentralized in order to share their cost between their subscribers. Security is not an exception and thus shared self-organized security schemes must be provided. Group Key Management (GKM) deals with the responsibility of providing privacy and group authentication in group communications focusing in the dynamism of the group (joins and leaves). We present a shar...
This document provides a framework for group key management for multicast security, motivated by three main considerations, namely the multicast application, scalability and trust-relationships among entities. It introduces two planes corresponding to the network entities and functions important to multicasting and to security. The key management plane consists of two hierarchy-levels in the fo...
Group keys can be used in order to communicate secretly sensitive data among IP cores. However, the flexibility and dynamic nature of MPSoCs force reshaping the security zones at runtime. Members of a zone must be able to efficiently compute the new group key while former members must be prevented for data disclosure. Efficiently creating security zones for achieving sensitive traffic isolation...
This document presents an ISAMKP Domain of Interpretation (DOI) for group key management to support secure group communications. The "GDOI" incorporates the definition of a Phase 1 SA of the Internet DOI, and proposes new payloads and exchanges according to the ISAKMP standard. The GDOI manages group security associations, which are used by IPSEC and potentially other data security protocols ru...
abstract recent studies suggest that prelistening activities play an important role in the development of listening comprehension (e.g. long 1990;chiang and dunkel 1992; schmidt-rinehart 1994; jensen and hansen 1995; robinson et al., 1995; buck, 1995; foster and skehan,1996; teng 1996; robinson, 2001; chang and read 2006). in line with previous studies and to shed light on a new aspect of sche...
Group-oriented services and wireless communication networks are among the emerging technologies of the last few years. Group key management, which is an important building bloc in securing group communication, has received a particular attention in both academic and industry research communities. This is due to the economical relevance of group-based applications, such as video on demand, video...
The problem of distributing multimedia securely over the Internet is often viewed as an instance of secure multicast communication, in which multicast messages are protected by a group key shared among the group of clients. One important class of key management schemes makes use of a hierarchical key distribution tree. Constructing a hierarchical tree based on secret shares rather than keys yie...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید