[PDF] Top 20 An Efficient Certificate-Free Key Distribution Protocol for Secure Group Communication in Grid Environment
Has 10000 "An Efficient Certificate-Free Key Distribution Protocol for Secure Group Communication in Grid Environment" found on our website. Below are the top 20 most common "An Efficient Certificate-Free Key Distribution Protocol for Secure Group Communication in Grid Environment".
An Efficient Certificate-Free Key Distribution Protocol for Secure Group Communication in Grid Environment
... the group members joining or leaving ...proposed an authenticated encryption mechanism for group communication in terms of the basic theory of threshold signature and the basic ... See full document
7
A New Scalable and Reliable Cost Effective Key Agreement Protocol for Secure Group Communication
... proposed protocol comparatively produces better results than the existing protocols in terms of less key computational cost and communication ...stored in the key server/member ... See full document
13
Certificateless Efficient Group Key Management Scheme in Mobile Adhoc Networks
... is an important and powerful tool for security services, namely authentication, confidentiality, integrity and ...non-repudiation. Key management is a basic part of any secure ... See full document
9
J. Microw. Optoelectron. Electromagn. Appl. vol.14 número2
... reuse in further different applications, and follows the main theoretical aspects described in ...disregarded in computational powerful requirements analysis, being intrinsically related only to the ... See full document
9
HYBRID MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS USED IN TIME CRITICAL APPLICATIONS
... MAC protocol is no longer adequate for these application ...pressure in pipes must deliver messages to an actuator connected to a valve in a timely and reliable ...example in power ... See full document
11
Modelling Efficient Process Oriented Architecture for Secure Mobile Commerce Using Hybrid Routing Protocol in Mobile Adhoc Network
... encountered in this field is multiplied more as to date, the majority of adhoc routing protocol research has been done using simulation ...implementation. In a simulator, the code is contained within ... See full document
11
Communications with QoS in IoT&Cloud environment
... To answer these questions some tests need to be preformed and after that an evaluation of what it’s acceptable based on the results. Tests were conducted on a computer with a 2.5Ghz processor running Ubuntu ... See full document
84
A group membership protocol for communication systems with both static and dynamic scheduling
... a protocol based on Time-Division Multiple Ac- cess (TDMA). I.e., in those protocols it is assumed that in each TDMA cycle, each processor can send a fixed amount of traffic, which must be sufficient ... See full document
10
CONGESTION MANAGEMENT IN DEREGULATED POWER SYSTEMS USING REAL CODED GENETIC ALGORITHM
... paper an attempt is made to explore the use of real coded genetic algorithm to find the optimal generation rescheduling for congestion management in deregulated ...occur in power system due to ... See full document
10
On the Support of Multimedia Applications over Wireless Mesh Networks
... members. Communication in this type of network is simple, any member wishing to transmit, do it through its ...same group), then the delivery will be direct, if not the CH sends queries to neighbors ... See full document
17
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
... routing protocol are used for Delay- Tolerant Mobile Networks ...distributive group mobile nodes with similar mobility pattern into a cluster, which can then interchangeably share their resources for ... See full document
6
Analysis of Secure Real Time Transport Protocol on VoIP over Wireless LAN in Campus Environment
... function. In voice and video communication, quality usually dictates whether the experience is a good or bad ...expressed in one number, from 1 to 5, 1 being the worst and 5 the ...delays in ... See full document
5
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc Network
... layer, an adversary could take part in the routing process and exploit the routing protocol to disrupt the normal functioning of the ...example, an adversary node could participate in a ... See full document
8
A Channel Adaptive Energy Efficient and Fair Scheduling Media Access Control Protocol for Mobile AdHoc Networks
... drawback in the existing protocols in dealing with energy management issues is that the time varying nature of the wireless channels among the ad hoc nodes is ...energy efficient Medium Access ... See full document
7
Epidemiol. Serv. Saúde vol.26 número2
... (IMS) in the municipality of Recife-PE, ...with key-informants who participated in the implementation and consolidation of the IMS were conducted; data of the Mortality Information System (SIM) and ... See full document
7
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
... text in public key one can get n quadratic equations in n variables and then Gröbner basis techniques can be applied to solve the ...equations in theory its complexity is exponential in ... See full document
10
An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks
... is an Improved Key Distribution Mechanism, based on hierarchical network architecture and bivariate polynomial-key pre-distribution ...mechanism. In IKDM, each sensor has a ... See full document
11
Min-min approach for scheduling in grid environment
... jobs in grid, computation based and communicational ...The communication based jobs like transfer a file from one node to another node require high bandwidth for its ...task in minimum delay ... See full document
9
A guide for upper-air reference measurements
... tification of type B uncertainties in a way that is robust (e.g., likely to hold up to critical scientific inquiry) is a much more challenging project. Examples of success, relevant to GRUAN, are the efforts to ... See full document
36
A study on the deployment of GA in a grid computing framework
... published in Polish, in their university journal, and an English version could not be found, except for the abstract of the ...produced in this thesis, as they both use the Travelling Salesman ... See full document
105
temas relacionados