نتایج جستجو برای: key management

تعداد نتایج: 1347875  

2005
Gerardo del Valle Roberto Gómez Cárdenas

The aim of this paper is to show some solutions for key management in ad hoc networks. The major problem in providing security services in such infrastructure less networks is how to manage the cryptographic keys that are needed. In order to design practical and sufficient key management systems it is necessary to understand the characteristics of ad hoc networks and why traditional key managem...

Journal: :CoRR 2015
Juan Antonio López-Ramos Joachim Rosenthal Davide Schipani Reto Schnyder

In this work we provide a suite of protocols for group key management based on general semigroup actions. Construction of the key is made in a distributed and collaborative way. We provide security proofs against passive attacks and suitable examples that may enhance both the security level and communication overheads of previous existing protocols.

2010
Dan Forsberg

OF DOCTORAL DISSERTATION AALTO UNIVERSITY SCHOOL OF SCIENCE AND TECHNOLOGY P.O. BOX 11000, FI-00076 AALTO http://www.aalto.fi Author Dan Forsberg Name of the dissertation Manuscript submitted 2010-06-04 Manuscript revised 2010-09-21 Date of the defence 2010-12-03 Article dissertation (summary + original articles) Monograph Faculty Department Field of research Opponent(s) Supervisor Instructor A...

2005
Yacine Challal Hamida Seba

Group key management is an important functional building block for any secure multicast architecture. Thereby, it has been extensively studied in the literature. In this paper we present relevant group key management protocols. Then, we compare them against some pertinent performance criteria. Keywords—Multicast, Security, Group Key Management.

2009
Yacine Challal Abdelmadjid Bouabdallah Hamida Seba

Group key management is an important functional building block for any secure multicast architecture. Thereby, it has been extensively studied in the literature. In this paper we present relevant group key management protocols. Then, we compare them against some pertinent performance criteria. Keywords—Multicast, Security, Group Key Management.

Journal: :ICST Trans. Mobile Communications Applications 2015
Trust Tshepo Mapoka Simon J. Shepherd Yousif A. Dama Haider M. AlSabbagh Raed A. Abd-Alhameed

Corresponding author. Email: [email protected]

2002
Volker Roth Michael Arnold

In this article we propose content based retrieval techniques as means of improving the key management used for digital watermark monitoring. In particular, we show how keys for watermark monitoring can be used on a per media item basis (rather than one secret key for all works copyrighted by a single owner), while retaining a high probability of successful spotting.

2016
Nazmul Islam M. A. Moyeen

The ample use of Wireless Sensor Network demands highly effective security mechanism for its sound operation in any hostile environment. The security of encrypted information greatly dependents on the rigidity of underlying Key Management techniques. Hence, key management becomes the most significant issue in case of security of Wireless Sensor Networks. The purpose of this paper is to assess m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید