Literatura académica sobre el tema "Hierarchical key Agreement"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Hierarchical key Agreement".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Hierarchical key Agreement"
Lee, Sung-Woon y Hyunsung Kim. "Freshness Consideration of Hierarchical Key Agreement Protocol in WSNs". International Journal of Security and Its Applications 8, n.º 1 (31 de enero de 2014): 81–92. http://dx.doi.org/10.14257/ijsia.2014.8.1.08.
Texto completoGuo, Hua, Yi Mu, Zhoujun Li y Xiyong Zhang. "An efficient and non-interactive hierarchical key agreement protocol". Computers & Security 30, n.º 1 (enero de 2011): 28–34. http://dx.doi.org/10.1016/j.cose.2010.10.003.
Texto completoAlimoradi, Reza, Fateme Amjadi, Seiied-Mohammad-Javad Razavian y M. H. Noorallahzadeh. "A Modified Hierarchical Multiple Key Agreement Scheme for WSN". International Journal of Advanced Networking and Applications 14, n.º 03 (2022): 5493–98. http://dx.doi.org/10.35444/ijana.2022.14312.
Texto completoMao, Kefei, Jianwei Liu y Jie Chen. "Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS". Journal of Electrical and Computer Engineering 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/1905872.
Texto completoMao, Kefei, Jie Chen y Jianwei Liu. "An Secure Hierarchical Key Agreement Scheme for Wireless Sensor Networks". International Journal of Multimedia and Ubiquitous Engineering 9, n.º 9 (30 de septiembre de 2016): 187–202. http://dx.doi.org/10.14257/ijmue.2016.11.9.20.
Texto completoKim, Hyunsung. "Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS". Sensors 14, n.º 12 (10 de diciembre de 2014): 23742–57. http://dx.doi.org/10.3390/s141223742.
Texto completoZhang, Qikun, Zengyu Cai, Yong Gan, Yuan Zhuang y Bingli Wang. "An authenticated hierarchical asymmetric group key agreement protocol based on identity". International Journal of Embedded Systems 11, n.º 6 (2019): 815. http://dx.doi.org/10.1504/ijes.2019.10025637.
Texto completoGan, Yong, Bingli Wang, Yuan Zhuang, Zengyu Cai y Qikun Zhang. "An authenticated hierarchical asymmetric group key agreement protocol based on identity". International Journal of Embedded Systems 11, n.º 6 (2019): 815. http://dx.doi.org/10.1504/ijes.2019.104006.
Texto completoZhang, Qikun, Xianmin Wang, Junling Yuan, Lu Liu, Ruifang Wang, Hong Huang y Yuanzhang Li. "A hierarchical group key agreement protocol using orientable attributes for cloud computing". Information Sciences 480 (abril de 2019): 55–69. http://dx.doi.org/10.1016/j.ins.2018.12.023.
Texto completoZhu, Guobin, Hu Xiong y Zhiguang Qin. "On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol". Wireless Personal Communications 74, n.º 2 (23 de julio de 2013): 883–89. http://dx.doi.org/10.1007/s11277-013-1328-0.
Texto completoTesis sobre el tema "Hierarchical key Agreement"
Tiwari, Mayank. "Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement". Thesis, 2018. https://etd.iisc.ac.in/handle/2005/4080.
Texto completoIndian Institute of Science
Tiwari, Mayank. "Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement". Thesis, 2018. https://etd.iisc.ac.in/handle/2005/4352.
Texto completoChu, Chih Wei y 朱志偉. "Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings". Thesis, 2009. http://ndltd.ncl.edu.tw/handle/15859437104079794941.
Texto completo長庚大學
資訊管理學研究所
97
With the progress of information technology, the computer crimes are emerging in an endless stream. It is because of the user’s privacy should be protected, when the user submit a service request to the service provider, both of them should check the identity of the other, and then build a shared key to accomplish the service request. Furthermore, when a conference is held, the chairman must verify the identities of all participants; afterwards, the chairman chooses a conference key and distributes it to legitimate participants. Besides, the participants should know who is in the conference. These prevent the malicious adversary from eavesdropping or impersonating to get some benefits. From the above point of view, and consideration of the security and performance in the system, we adopt the identity-based cryptosystem and the elliptic curve cryptosystem to design our protocols. Since the protocols have shorter key size, lower costs of management the keys, and lower costs of transformation, they are suitable for applying in various platforms, such as the smart card, mobile phone, and other lower storage devices. In this thesis, there are three distinct types of protocol: privacy-preserved identification protocol with key agreement, privacy-preserved conference key distribution protocol, and hierarchical conference key distribution protocols preserving user privacy to satisfy different communication environments.
Chih-Wei, Chu y 朱志偉. "Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings". Thesis, 2009. http://ndltd.ncl.edu.tw/handle/75214608248583788202.
Texto completo長庚大學
資訊管理研究所
98
With the progress of information technology, the computer crimes are emerging in an endless stream. It is because of the user’s privacy should be protected, when the user submit a service request to the service provider, both of them should check the identity of the other, and then build a shared key to accomplish the service request. Furthermore, when a conference is held, the chairman must verify the identities of all participants; afterwards, the chairman chooses a conference key and distributes it to legitimate participants. Besides, the participants should know who is in the conference. These prevent the malicious adversary from eavesdropping or impersonating to get some benefits. From the above point of view, and consideration of the security and performance in the system, we adopt the identity-based cryptosystem and the elliptic curve cryptosystem to design our protocols. Since the protocols have shorter key size, lower costs of management the keys, and lower costs of transformation, they are suitable for applying in various platforms, such as the smart card, mobile phone, and other lower storage devices. In this thesis, there are three distinct types of protocol: privacy-preserved identification protocol with key agreement, privacy-preserved conference key distribution protocol, and hierarchical conference key distribution protocols preserving user privacy to satisfy different communication environments.
Capítulos de libros sobre el tema "Hierarchical key Agreement"
Kim, Hyunsung. "Freshness Preserving Hierarchical Key Agreement Protocol Over Hierarchical MANETs". En Lecture Notes in Electrical Engineering, 927–33. Dordrecht: Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-6738-6_114.
Texto completoKim, Hyunsung. "Non-interactive Hierarchical Key Agreement Protocol over Hierarchical Wireless Sensor Networks". En Communications in Computer and Information Science, 86–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35264-5_12.
Texto completoSarkar, Pinaki. "Lightweight Deterministic Non Interactive (ni) Hierarchical Key Agreement Scheme (KAS)". En Network and System Security, 315–31. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_23.
Texto completoGennaro, Rosario, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt y Stephen D. Wolthusen. "Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs". En Computer Security - ESORICS 2008, 49–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88313-5_4.
Texto completoLin, Tzu-Wei y Chien-Lung Hsu. "Privacy-Preserved Hierarchical Authentication and Key Agreement for AI-Enabled Telemedicine Systems". En 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications, 134–42. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-05491-4_14.
Texto completoSrinidhi, V., K. V. Lakshmy y M. Sethumadhavan. "HGKA: Hierarchical Dynamic Group Key Agreement Protocol for Machine Type Communication in LTE Networks". En Communications in Computer and Information Science, 231–41. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-5826-5_17.
Texto completoSarkar, Pinaki y Morshed Uddin Chowdhury. "Inductive Hierarchical Identity Based Key Agreement with Pre-deployment Interactions (i-H-IB-KA-pdi)". En Applications and Techniques in Information Security, 106–14. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-2741-3_9.
Texto completoBertolini, Alessio y Daniel Clegg. "Access to Social Protection by Immigrants, Emigrants and Resident Nationals in the UK". En IMISCOE Research Series, 419–32. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51237-8_26.
Texto completoActas de conferencias sobre el tema "Hierarchical key Agreement"
Xia, Jingbo, Yu Rongwei y Xiaochuan Ai. "A New Efficient Hierarchical Key Agreement Scheme". En 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.80.
Texto completoEskeland, Sigurd y Vladimir Oleshchuk. "Hierarchical Multi-Party Key Agreement for Wireless Networks". En Third International Symposium on Information Assurance and Security. IEEE, 2007. http://dx.doi.org/10.1109/isias.2007.4299748.
Texto completoEskeland, Sigurd y Vladimir Oleshchuk. "Hierarchical Multi-Party Key Agreement for Wireless Networks". En Third International Symposium on Information Assurance and Security. IEEE, 2007. http://dx.doi.org/10.1109/ias.2007.82.
Texto completoWang, Shiuh-Jeng, Yuh-Ren Tsai, Chien-Chih Shen y Pin-You Chen. "Hierarchical Key Agreement Protocols in Group-User Systems". En 2009 Fifth International Conference on Information Assurance and Security. IEEE, 2009. http://dx.doi.org/10.1109/ias.2009.152.
Texto completoXing, Qianqian, Baosheng Wang, Xiaofeng Wang, Jing Tao y Liu Liu. "A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive Key Agreement for Wireless Networks". En 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, 2017. http://dx.doi.org/10.1109/trustcom/bigdatase/icess.2017.224.
Texto completoLin, Hua-Yi. "High-Effect Key Management Associated with Secure Data Transmission Approaches in Sensor Networks Using a Hierarchical-Based Cluster Elliptic Curve Key Agreement". En 2009 Fifth International Joint Conference on INC, IMS and IDC. IEEE, 2009. http://dx.doi.org/10.1109/ncm.2009.194.
Texto completoBuehler, Markus J. y Je´re´mie Bertaud. "Hierarchical Structure Controls Nanomechanical Properties of Vimentin Intermediate Filaments". En ASME 2010 First Global Congress on NanoEngineering for Medicine and Biology. ASMEDC, 2010. http://dx.doi.org/10.1115/nemb2010-13103.
Texto completoBaumstein, Anatoly, Partha Routh, Kyle Basler-Reeder, Young Ho Cha, David Tang, Jay Barr y Alex Martinez. "Elastic Full Wavefield Inversion: The Benefits and the Challenges in Clastic and Subsalt Setting". En ADIPEC. SPE, 2022. http://dx.doi.org/10.2118/211620-ms.
Texto completo