نتایج جستجو برای: rekeying

تعداد نتایج: 186  

Journal: :Comput. Sci. Inf. Syst. 2013
Inshil Doh Jiyoung Lim Kijoon Chae

In mobile open Internet Protocol TV (IPTV) which is one of the major attracting technologies recently, the security is a key issue for reliable service, because the mobility and the openness in IPTV could cause much more vulnerabilities to various attacks compared with traditional IPTV services. In this paper, we propose an energyefficient and secure channel group key establishment and rekeying...

2017
Brajesh Kumar Kaushik YunSuk Yeo Sangwon Hyun Tai-Myoung Chung

In the past, Ad-hoc networks were used in limited areas which require secure group communication without Internet access, such as the army or emergencies. However, Ad-hoc networks currently are widely used in variety applications like group chat, smart applications, research testbed etc. Ad-hoc network is basically group based network in the absence of access point so it is prevalent to provide...

2016
Johanna Sepulveda Daniel Flórez Vincent Immler Guy Gogniat Georg Sigl

Group keys can be used in order to communicate secretly sensitive data among IP cores. However, the flexibility and dynamic nature of MPSoCs force reshaping the security zones at runtime. Members of a zone must be able to efficiently compute the new group key while former members must be prevented for data disclosure. Efficiently creating security zones for achieving sensitive traffic isolation...

Journal: :CoRR 2009
P. M. Joe Prathap V. Vasudevan

With the evolution of the Internet, multicast communications seem particularly well adapted for large scale commercial distribution applications, for example, the pay TV channels and secure videoconferencing. Key management for multicast remains an open topic in secure Communications today. Key management mainly has to do with the distribution and update of keying material during the group life...

Journal: :ICST Transactions on Security and Safety 2021

2013
B. Gopalakrishnan A. Shanmugam

An efficient and secure group communication in Mobile Adhoc Network (MANETs) has brought attention to many security issues. In this paper, we propose Energy Efficient Dynamic Core based Multicast Routing Protocol to establish the path between the nodes that participate in group communication. During the routing process each node computes a Pythagorean Triple and constructs a Pythagorean Triple ...

2016
N. Renugadevi

This paper presents an efficient contributory group key agreement protocol for secure communication between the lightweight small devices in cognitive radio mobile ad hoc networks. A Ternary tree based Group ECDH.2 (TGECDH.2) protocol that uses a batch rekeying algorithm during membership change is proposed in this paper. This ternary tree is a balanced key tree in which appropriate insertion p...

Journal: :IEEE Transactions on Dependable and Secure Computing 2007

Journal: :International Journal of Computer Applications 2010

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید