• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 60,208
Next 10 →

Table 1. Classification of key management schemes

in Multimedia Security In Group Communications: Recent Progress in Wired and Wireless Networks
by Ahmet M. Eskicioglu
"... In PAGE 2: ... If the computation and communication costs at the sender increases linearly with the size of the multicast group, then the scheme is considered to be non-scalable. Table1 lists the key management schemes according to the new criteria. Table 1.... In PAGE 2: ...Among the schemes listed in Table1 , three scalable schemes, namely, the Centralized Tree-Based Key Management (CTKM) [6], Iolus [23] and DEP [24] are compared through simulation using real-life multicast group membership traces [37]. The performance metrics used in this comparison are (1) the encryption cost at the sender, and (2) encryption/decryption cost at the members and subgroup managers.... ..."

Table 1: Comparison of Key Management schemes

in CRTDH: An Efficient Key Agreement Scheme for Secure Group Communications in Wireless Ad Hoc Networks
by Ravi K Balach, Byrav Ramamurthy, N. V. Vinodch

Table 2: Comparisons of the proposed protocols Conventional challenge-response scheme Our scheme More efficient key management no yes

in unknown title
by unknown authors 2006
"... In PAGE 5: ... As a result of the previous comparisons, the new scheme has proven its superiority in key management, se- curity enhancement and access rights management over conventional challenge-response protocols. Table2 gives a summary of these results. 5 Conclusions The introduction of the self-concealing mechanism can spare the requirement of a bulky database for the shared keys.... ..."

Table 3 Comparison of key management protocols for ASN Schemes Applicable to

in Security considerations in ad hoc sensor networks
by Fei Hu , Neeraj K. Sharma 2003
"... In PAGE 11: ... One drawback of this scheme is that some wireless links may not be keyed and thus a node may need to use a multi-link path to com- municate with one of its neighbor nodes. Table3 compares the characteristics of the abovementioned key management protocols from the points of view of: (1) Level of its applicability to ASN; (2) Power saving; (3) Storage require- ments; (4) Key distribution latency; (5) Colla- Table 3 Comparison of key management protocols for ASN Schemes Applicable to... ..."

Table 4. Key management schemes for mobile ad hoc networks.

in Abstract
by Patroklos G. Argyroudis
"... In PAGE 31: ... By fabricating and forwarding route error messages an attacker can try to disrupt the operation of existing routes, not only breaking connectivity but also creating additional routing overhead in the network as a result of legitimate nodes trying to establish alternative paths. In Table4 we present the route maintenance characteristics of the protocols we have analyzed. The solution adopted by most of the analyzed protocols requires the signing of the complete error message by the node that generates or forwards it.... In PAGE 33: ... In this section we will present several key management solutions that have been specifically proposed to address the challenges of mobile ad hoc networks and discuss their behavior in respect to mobility patterns and operational requirements. Table4 summarizes the results of our analysis. Table 4.... ..."

TABLE VIII Hierarchies supported by different key management schemes.

in Key Management for Content Access Control in a Hierarchy
by H. Ragab Hassen, A. Bouabdallah, H. Bettahar, Y. Challal

TABLE IX Suitability of key management schemes for hierarchy change.

in Key Management for Content Access Control in a Hierarchy
by H. Ragab Hassen, A. Bouabdallah, H. Bettahar, Y. Challal

TABLE I VULNERABILITY OF PREVAIL CENTRALIZED KEY MANAGEMENT SCHEMES

in Securing Dynamic Membership Information in Multicast Communications
by Yan Sun, K. J. Ray Liu

TABLE III Comparison of Distributed Key Management Protocols Scheme Nb. rounds Nb. messages DH exchange Leader required

in Group Key Management Protocols: A Novel Taxonomy
by Yacine Challal, Hamida Seba

Table 1 Key management functions in static and dynamic keying. (Admin. Keys assumed) Static keying Dynamic keying

in Key Management for Long Lived Sensor Networks in Hostile Environments
by Michael Chorzempa, Jung-min Park, Mohamed Eltoweissy
"... In PAGE 3: ... While static schemes primarily assume that administrative keys will outlive the network and emphasize pair-wise communication keys, dynamic schemes advocate re-keying to achieve attack resiliency in long-lived networks and emphasizes group communication keys. Table1 shows the primary differences be- tween static and dynamic keying in performing key management functions. Mohar- ram and Eltoweissy [17] provide a performance and security comparison between static and dynamic keying.... ..."
Next 10 →
Results 1 - 10 of 60,208
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University