• Nenhum resultado encontrado

[PDF] Top 20 An Efficient Certificate-Free Key Distribution Protocol for Secure Group Communication in Grid Environment

Has 10000 "An Efficient Certificate-Free Key Distribution Protocol for Secure Group Communication in Grid Environment" found on our website. Below are the top 20 most common "An Efficient Certificate-Free Key Distribution Protocol for Secure Group Communication in Grid Environment".

An Efficient Certificate-Free Key Distribution Protocol for Secure Group Communication in Grid Environment

An Efficient Certificate-Free Key Distribution Protocol for Secure Group Communication in Grid Environment

... the group members joining or leaving ...proposed an authenticated encryption mechanism for group communication in terms of the basic theory of threshold signature and the basic ... See full document

7

A New Scalable and Reliable Cost Effective Key Agreement Protocol for Secure Group Communication

A New Scalable and Reliable Cost Effective Key Agreement Protocol for Secure Group Communication

... proposed protocol comparatively produces better results than the existing protocols in terms of less key computational cost and communication ...stored in the key server/member ... See full document

13

Certificateless Efficient Group Key Management Scheme in Mobile Adhoc Networks

Certificateless Efficient Group Key Management Scheme in Mobile Adhoc Networks

... is an important and powerful tool for security services, namely authentication, confidentiality, integrity and ...non-repudiation. Key management is a basic part of any secure ... See full document

9

J. Microw. Optoelectron. Electromagn. Appl.  vol.14 número2

J. Microw. Optoelectron. Electromagn. Appl. vol.14 número2

... reuse in further different applications, and follows the main theoretical aspects described in ...disregarded in computational powerful requirements analysis, being intrinsically related only to the ... See full document

9

HYBRID MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS USED IN TIME CRITICAL APPLICATIONS

HYBRID MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS USED IN TIME CRITICAL APPLICATIONS

... MAC protocol is no longer adequate for these application ...pressure in pipes must deliver messages to an actuator connected to a valve in a timely and reliable ...example in power ... See full document

11

Modelling Efficient Process Oriented Architecture for Secure Mobile Commerce Using Hybrid Routing Protocol in Mobile Adhoc Network

Modelling Efficient Process Oriented Architecture for Secure Mobile Commerce Using Hybrid Routing Protocol in Mobile Adhoc Network

... encountered in this field is multiplied more as to date, the majority of adhoc routing protocol research has been done using simulation ...implementation. In a simulator, the code is contained within ... See full document

11

Communications with QoS in IoT&Cloud environment

Communications with QoS in IoT&Cloud environment

... To answer these questions some tests need to be preformed and after that an evaluation of what it’s acceptable based on the results. Tests were conducted on a computer with a 2.5Ghz processor running Ubuntu ... See full document

84

A group membership protocol for communication systems with both static and dynamic scheduling

A group membership protocol for communication systems with both static and dynamic scheduling

... a protocol based on Time-Division Multiple Ac- cess (TDMA). I.e., in those protocols it is assumed that in each TDMA cycle, each processor can send a fixed amount of traffic, which must be sufficient ... See full document

10

CONGESTION MANAGEMENT IN DEREGULATED POWER SYSTEMS USING REAL CODED GENETIC ALGORITHM

CONGESTION MANAGEMENT IN DEREGULATED POWER SYSTEMS USING REAL CODED GENETIC ALGORITHM

... paper an attempt is made to explore the use of real coded genetic algorithm to find the optimal generation rescheduling for congestion management in deregulated ...occur in power system due to ... See full document

10

On the Support of Multimedia Applications over Wireless Mesh Networks

On the Support of Multimedia Applications over Wireless Mesh Networks

... members. Communication in this type of network is simple, any member wishing to transmit, do it through its ...same group), then the delivery will be direct, if not the CH sends queries to neighbors ... See full document

17

AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)

AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)

... routing protocol are used for Delay- Tolerant Mobile Networks ...distributive group mobile nodes with similar mobility pattern into a cluster, which can then interchangeably share their resources for ... See full document

6

Analysis of Secure Real Time Transport Protocol on VoIP over Wireless LAN in Campus Environment

Analysis of Secure Real Time Transport Protocol on VoIP over Wireless LAN in Campus Environment

... function. In voice and video communication, quality usually dictates whether the experience is a good or bad ...expressed in one number, from 1 to 5, 1 being the worst and 5 the ...delays in ... See full document

5

DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc Network

DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc Network

... layer, an adversary could take part in the routing process and exploit the routing protocol to disrupt the normal functioning of the ...example, an adversary node could participate in a ... See full document

8

A Channel Adaptive Energy Efficient and Fair Scheduling Media Access Control Protocol for Mobile AdHoc Networks

A Channel Adaptive Energy Efficient and Fair Scheduling Media Access Control Protocol for Mobile AdHoc Networks

... drawback in the existing protocols in dealing with energy management issues is that the time varying nature of the wireless channels among the ad hoc nodes is ...energy efficient Medium Access ... See full document

7

Epidemiol. Serv. Saúde  vol.26 número2

Epidemiol. Serv. Saúde vol.26 número2

... (IMS) in the municipality of Recife-PE, ...with key-informants who participated in the implementation and consolidation of the IMS were conducted; data of the Mortality Information System (SIM) and ... See full document

7

Little Dragon Two: An efficient Multivariate Public Key Cryptosystem

Little Dragon Two: An efficient Multivariate Public Key Cryptosystem

... text in public key one can get n quadratic equations in n variables and then Gröbner basis techniques can be applied to solve the ...equations in theory its complexity is exponential in ... See full document

10

An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks

An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks

... is an Improved Key Distribution Mechanism, based on hierarchical network architecture and bivariate polynomial-key pre-distribution ...mechanism. In IKDM, each sensor has a ... See full document

11

Min-min approach for scheduling in grid environment

Min-min approach for scheduling in grid environment

... jobs in grid, computation based and communicational ...The communication based jobs like transfer a file from one node to another node require high bandwidth for its ...task in minimum delay ... See full document

9

A guide for upper-air reference measurements

A guide for upper-air reference measurements

... tification of type B uncertainties in a way that is robust (e.g., likely to hold up to critical scientific inquiry) is a much more challenging project. Examples of success, relevant to GRUAN, are the efforts to ... See full document

36

A study on the deployment of GA in a grid computing framework

A study on the deployment of GA in a grid computing framework

... published in Polish, in their university journal, and an English version could not be found, except for the abstract of the ...produced in this thesis, as they both use the Travelling Salesman ... See full document

105

Show all 10000 documents...