نتایج جستجو برای: group key management
تعداد نتایج: 2218760 فیلتر نتایج به سال:
introduction: diabetes mellitus is an growing national and international public health concern. the number of people affected by diabetes in world by 2030 will be 69% in developing countries. regular physical activity plays a key role in the management of type 2 diabetes melitus, particularly glycemic control. it has been recommended that peoples with type 2 diabetes participate in moderate-int...
the computer industry has defined the ieee 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. as the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. ieee 802.16e uses multica...
this study investigated how group formation method, namely student-selected vs. teacher-assigned, influences the results of the community model of teaching creative writing; i.e., group dynamics and group outcome (the quality of performance). the study adopted an experimental comparison group and microgenetic research design to observe the change process over a relatively short period of time. ...
Various network applications require sending data onto one or many members, maintaining security in the large groups is one of the major obstacles for controlling access. Unfortunately, IP multicast is not providing any security over the group communication. Group key management is a fundamental mechanism for secured multicast. This paper presents relevant group key management protocols. Then, ...
This paper presents a new crypto scheme whose title promises it to be so boring that no-one will bother reading past the abstract. Because of this, the remainder of the paper is left blank.
the present study aimed at investigating the relationship between iranian efl teachers’ classroom management orientations and their teaching styles. additionally, the difference between male and female teachers’ teaching styles and classroom management orientations and their relationship with experience and age were explored. three hundred efl teachers filled in attitudes and beliefs on classro...
Traditional analysis of group key protocol performance is based on the cost of performing a single operation. We extend this analysis to examine the performance behavior of five group key protocols after execution of multiple operation. This paper reports the results of our experiments for 100 operations consist of combinations of join, leave, mass add and mass leave operations. The results of ...
549 Abstract— Lim et al. proposed a Hybrid Group Key Management scheme for Hierarchical Self-Organizing Sensor Network in 2008 to provide a secure way to pass down the group key for cluster-based communication. This paper presents two practical attacks on the scheme proposed by Lim et al. by tampering sensor nodes of a cluster to recover necessary secret keys and by exploiting the IDS employed ...
A wireless sensor network is a collection of devices limited in lowpowered batteries, processing, communication bandwidth capabilities and low memory availability. Due to these constraints, most of security approaches used in wired networks cannot be applied directly in this environment. In this work, we present a hybrid protocol that treats the group key management scheme and the transparent c...
In this work we provide a suite of protocols for group key management based on general semigroup actions. Construction of the key is made in a distributed and collaborative way. We provide security proofs against passive attacks and suitable examples that may enhance both the security level and communication overheads of previous existing protocols.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید