Gotowa bibliografia na temat „Hierarchical key Agreement”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Hierarchical key Agreement”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Hierarchical key Agreement"
Lee, Sung-Woon, i Hyunsung Kim. "Freshness Consideration of Hierarchical Key Agreement Protocol in WSNs". International Journal of Security and Its Applications 8, nr 1 (31.01.2014): 81–92. http://dx.doi.org/10.14257/ijsia.2014.8.1.08.
Pełny tekst źródłaGuo, Hua, Yi Mu, Zhoujun Li i Xiyong Zhang. "An efficient and non-interactive hierarchical key agreement protocol". Computers & Security 30, nr 1 (styczeń 2011): 28–34. http://dx.doi.org/10.1016/j.cose.2010.10.003.
Pełny tekst źródłaAlimoradi, Reza, Fateme Amjadi, Seiied-Mohammad-Javad Razavian i M. H. Noorallahzadeh. "A Modified Hierarchical Multiple Key Agreement Scheme for WSN". International Journal of Advanced Networking and Applications 14, nr 03 (2022): 5493–98. http://dx.doi.org/10.35444/ijana.2022.14312.
Pełny tekst źródłaMao, Kefei, Jianwei Liu i Jie Chen. "Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS". Journal of Electrical and Computer Engineering 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/1905872.
Pełny tekst źródłaMao, Kefei, Jie Chen i Jianwei Liu. "An Secure Hierarchical Key Agreement Scheme for Wireless Sensor Networks". International Journal of Multimedia and Ubiquitous Engineering 9, nr 9 (30.09.2016): 187–202. http://dx.doi.org/10.14257/ijmue.2016.11.9.20.
Pełny tekst źródłaKim, Hyunsung. "Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS". Sensors 14, nr 12 (10.12.2014): 23742–57. http://dx.doi.org/10.3390/s141223742.
Pełny tekst źródłaZhang, Qikun, Zengyu Cai, Yong Gan, Yuan Zhuang i Bingli Wang. "An authenticated hierarchical asymmetric group key agreement protocol based on identity". International Journal of Embedded Systems 11, nr 6 (2019): 815. http://dx.doi.org/10.1504/ijes.2019.10025637.
Pełny tekst źródłaGan, Yong, Bingli Wang, Yuan Zhuang, Zengyu Cai i Qikun Zhang. "An authenticated hierarchical asymmetric group key agreement protocol based on identity". International Journal of Embedded Systems 11, nr 6 (2019): 815. http://dx.doi.org/10.1504/ijes.2019.104006.
Pełny tekst źródłaZhang, Qikun, Xianmin Wang, Junling Yuan, Lu Liu, Ruifang Wang, Hong Huang i Yuanzhang Li. "A hierarchical group key agreement protocol using orientable attributes for cloud computing". Information Sciences 480 (kwiecień 2019): 55–69. http://dx.doi.org/10.1016/j.ins.2018.12.023.
Pełny tekst źródłaZhu, Guobin, Hu Xiong i Zhiguang Qin. "On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol". Wireless Personal Communications 74, nr 2 (23.07.2013): 883–89. http://dx.doi.org/10.1007/s11277-013-1328-0.
Pełny tekst źródłaRozprawy doktorskie na temat "Hierarchical key Agreement"
Tiwari, Mayank. "Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement". Thesis, 2018. https://etd.iisc.ac.in/handle/2005/4080.
Pełny tekst źródłaIndian Institute of Science
Tiwari, Mayank. "Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement". Thesis, 2018. https://etd.iisc.ac.in/handle/2005/4352.
Pełny tekst źródłaChu, Chih Wei, i 朱志偉. "Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings". Thesis, 2009. http://ndltd.ncl.edu.tw/handle/15859437104079794941.
Pełny tekst źródła長庚大學
資訊管理學研究所
97
With the progress of information technology, the computer crimes are emerging in an endless stream. It is because of the user’s privacy should be protected, when the user submit a service request to the service provider, both of them should check the identity of the other, and then build a shared key to accomplish the service request. Furthermore, when a conference is held, the chairman must verify the identities of all participants; afterwards, the chairman chooses a conference key and distributes it to legitimate participants. Besides, the participants should know who is in the conference. These prevent the malicious adversary from eavesdropping or impersonating to get some benefits. From the above point of view, and consideration of the security and performance in the system, we adopt the identity-based cryptosystem and the elliptic curve cryptosystem to design our protocols. Since the protocols have shorter key size, lower costs of management the keys, and lower costs of transformation, they are suitable for applying in various platforms, such as the smart card, mobile phone, and other lower storage devices. In this thesis, there are three distinct types of protocol: privacy-preserved identification protocol with key agreement, privacy-preserved conference key distribution protocol, and hierarchical conference key distribution protocols preserving user privacy to satisfy different communication environments.
Chih-Wei, Chu, i 朱志偉. "Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings". Thesis, 2009. http://ndltd.ncl.edu.tw/handle/75214608248583788202.
Pełny tekst źródła長庚大學
資訊管理研究所
98
With the progress of information technology, the computer crimes are emerging in an endless stream. It is because of the user’s privacy should be protected, when the user submit a service request to the service provider, both of them should check the identity of the other, and then build a shared key to accomplish the service request. Furthermore, when a conference is held, the chairman must verify the identities of all participants; afterwards, the chairman chooses a conference key and distributes it to legitimate participants. Besides, the participants should know who is in the conference. These prevent the malicious adversary from eavesdropping or impersonating to get some benefits. From the above point of view, and consideration of the security and performance in the system, we adopt the identity-based cryptosystem and the elliptic curve cryptosystem to design our protocols. Since the protocols have shorter key size, lower costs of management the keys, and lower costs of transformation, they are suitable for applying in various platforms, such as the smart card, mobile phone, and other lower storage devices. In this thesis, there are three distinct types of protocol: privacy-preserved identification protocol with key agreement, privacy-preserved conference key distribution protocol, and hierarchical conference key distribution protocols preserving user privacy to satisfy different communication environments.
Części książek na temat "Hierarchical key Agreement"
Kim, Hyunsung. "Freshness Preserving Hierarchical Key Agreement Protocol Over Hierarchical MANETs". W Lecture Notes in Electrical Engineering, 927–33. Dordrecht: Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-6738-6_114.
Pełny tekst źródłaKim, Hyunsung. "Non-interactive Hierarchical Key Agreement Protocol over Hierarchical Wireless Sensor Networks". W Communications in Computer and Information Science, 86–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35264-5_12.
Pełny tekst źródłaSarkar, Pinaki. "Lightweight Deterministic Non Interactive (ni) Hierarchical Key Agreement Scheme (KAS)". W Network and System Security, 315–31. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_23.
Pełny tekst źródłaGennaro, Rosario, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt i Stephen D. Wolthusen. "Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs". W Computer Security - ESORICS 2008, 49–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88313-5_4.
Pełny tekst źródłaLin, Tzu-Wei, i Chien-Lung Hsu. "Privacy-Preserved Hierarchical Authentication and Key Agreement for AI-Enabled Telemedicine Systems". W 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications, 134–42. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-05491-4_14.
Pełny tekst źródłaSrinidhi, V., K. V. Lakshmy i M. Sethumadhavan. "HGKA: Hierarchical Dynamic Group Key Agreement Protocol for Machine Type Communication in LTE Networks". W Communications in Computer and Information Science, 231–41. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-5826-5_17.
Pełny tekst źródłaSarkar, Pinaki, i Morshed Uddin Chowdhury. "Inductive Hierarchical Identity Based Key Agreement with Pre-deployment Interactions (i-H-IB-KA-pdi)". W Applications and Techniques in Information Security, 106–14. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-2741-3_9.
Pełny tekst źródłaBertolini, Alessio, i Daniel Clegg. "Access to Social Protection by Immigrants, Emigrants and Resident Nationals in the UK". W IMISCOE Research Series, 419–32. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51237-8_26.
Pełny tekst źródłaStreszczenia konferencji na temat "Hierarchical key Agreement"
Xia, Jingbo, Yu Rongwei i Xiaochuan Ai. "A New Efficient Hierarchical Key Agreement Scheme". W 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.80.
Pełny tekst źródłaEskeland, Sigurd, i Vladimir Oleshchuk. "Hierarchical Multi-Party Key Agreement for Wireless Networks". W Third International Symposium on Information Assurance and Security. IEEE, 2007. http://dx.doi.org/10.1109/isias.2007.4299748.
Pełny tekst źródłaEskeland, Sigurd, i Vladimir Oleshchuk. "Hierarchical Multi-Party Key Agreement for Wireless Networks". W Third International Symposium on Information Assurance and Security. IEEE, 2007. http://dx.doi.org/10.1109/ias.2007.82.
Pełny tekst źródłaWang, Shiuh-Jeng, Yuh-Ren Tsai, Chien-Chih Shen i Pin-You Chen. "Hierarchical Key Agreement Protocols in Group-User Systems". W 2009 Fifth International Conference on Information Assurance and Security. IEEE, 2009. http://dx.doi.org/10.1109/ias.2009.152.
Pełny tekst źródłaXing, Qianqian, Baosheng Wang, Xiaofeng Wang, Jing Tao i Liu Liu. "A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive Key Agreement for Wireless Networks". W 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, 2017. http://dx.doi.org/10.1109/trustcom/bigdatase/icess.2017.224.
Pełny tekst źródłaLin, Hua-Yi. "High-Effect Key Management Associated with Secure Data Transmission Approaches in Sensor Networks Using a Hierarchical-Based Cluster Elliptic Curve Key Agreement". W 2009 Fifth International Joint Conference on INC, IMS and IDC. IEEE, 2009. http://dx.doi.org/10.1109/ncm.2009.194.
Pełny tekst źródłaBuehler, Markus J., i Je´re´mie Bertaud. "Hierarchical Structure Controls Nanomechanical Properties of Vimentin Intermediate Filaments". W ASME 2010 First Global Congress on NanoEngineering for Medicine and Biology. ASMEDC, 2010. http://dx.doi.org/10.1115/nemb2010-13103.
Pełny tekst źródłaBaumstein, Anatoly, Partha Routh, Kyle Basler-Reeder, Young Ho Cha, David Tang, Jay Barr i Alex Martinez. "Elastic Full Wavefield Inversion: The Benefits and the Challenges in Clastic and Subsalt Setting". W ADIPEC. SPE, 2022. http://dx.doi.org/10.2118/211620-ms.
Pełny tekst źródła