نتایج جستجو برای: key management
تعداد نتایج: 1347875 فیلتر نتایج به سال:
The aim of this paper is to show some solutions for key management in ad hoc networks. The major problem in providing security services in such infrastructure less networks is how to manage the cryptographic keys that are needed. In order to design practical and sufficient key management systems it is necessary to understand the characteristics of ad hoc networks and why traditional key managem...
In this work we provide a suite of protocols for group key management based on general semigroup actions. Construction of the key is made in a distributed and collaborative way. We provide security proofs against passive attacks and suitable examples that may enhance both the security level and communication overheads of previous existing protocols.
OF DOCTORAL DISSERTATION AALTO UNIVERSITY SCHOOL OF SCIENCE AND TECHNOLOGY P.O. BOX 11000, FI-00076 AALTO http://www.aalto.fi Author Dan Forsberg Name of the dissertation Manuscript submitted 2010-06-04 Manuscript revised 2010-09-21 Date of the defence 2010-12-03 Article dissertation (summary + original articles) Monograph Faculty Department Field of research Opponent(s) Supervisor Instructor A...
Group key management is an important functional building block for any secure multicast architecture. Thereby, it has been extensively studied in the literature. In this paper we present relevant group key management protocols. Then, we compare them against some pertinent performance criteria. Keywords—Multicast, Security, Group Key Management.
Group key management is an important functional building block for any secure multicast architecture. Thereby, it has been extensively studied in the literature. In this paper we present relevant group key management protocols. Then, we compare them against some pertinent performance criteria. Keywords—Multicast, Security, Group Key Management.
Corresponding author. Email: [email protected]
In this article we propose content based retrieval techniques as means of improving the key management used for digital watermark monitoring. In particular, we show how keys for watermark monitoring can be used on a per media item basis (rather than one secret key for all works copyrighted by a single owner), while retaining a high probability of successful spotting.
The ample use of Wireless Sensor Network demands highly effective security mechanism for its sound operation in any hostile environment. The security of encrypted information greatly dependents on the rigidity of underlying Key Management techniques. Hence, key management becomes the most significant issue in case of security of Wireless Sensor Networks. The purpose of this paper is to assess m...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید