Results 231 to 240 of about 3,013,541 (287)
Bridging the gap between human behaviour and animal welfare: A study on human behaviour change and body condition scoring of suckler cows. [PDF]
Jessiman L +3 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Key agreement in dynamic peer groups
IEEE Transactions on Parallel and Distributed Systems, 2000As a result of the increased popularity of group-oriented applications and protocols, group communication occurs in many different settings: from network multicasting to application layer tele- and videoconferencing. Regardless of the application environment, security services are necessary to provide communication privacy and integrity.
M. Steiner, G. Tsudik, M. Waidner
openaire +3 more sources
Key Exposure Resistant Group Key Agreement Protocol
2021With the development of the Internet and computer science, the demand for collaboration over the Internet is constantly increasing. The group key agreement (GKA) protocol has been a desirable candidate for this demand. However, the possibility that some parties in the GKA protocol may be tampered with by the adversary leads to the stronger requirement ...
Tianqi Zhou +4 more
openaire +1 more source
32nd IEEE Conference on Local Computer Networks (LCN 2007), 2007
Secure group communication has various applications. Requirements for an application differ in various parameters such as tolerance times for join and leave, arrival rate, departure rate, staying period and group life time. Existing group key agreement protocols do not harness knowledge of application requirements.
INGLE, RAJESH, SIVAKUMAR, G
openaire +2 more sources
Secure group communication has various applications. Requirements for an application differ in various parameters such as tolerance times for join and leave, arrival rate, departure rate, staying period and group life time. Existing group key agreement protocols do not harness knowledge of application requirements.
INGLE, RAJESH, SIVAKUMAR, G
openaire +2 more sources
Flexible Robust Group Key Agreement
IEEE Transactions on Parallel and Distributed Systems, 2011A robust group key agreement protocol (GKA) allows a set of players to establish a shared secret key, regardless of network/node failures. Current constant-round GKA protocols are either efficient and nonrobust or robust but not efficient; assuming a reliable broadcast communication medium, the standard encryption-based group key agreement protocol can
S Jarecki, null Jihye Kim, G Tsudik
openaire +1 more source
2006
Especially for key establishment protocols to be used in internet applications, the (privacy) concern of deniability arises: Can a protocol transcript be used—possibly by a participant—to prove the involvement of another party in the protocol? For two party key establishment protocols, a common technique for achieving deniability is the replacement of ...
Jens-Matthias Bohli, Rainer Steinwandt
openaire +1 more source
Especially for key establishment protocols to be used in internet applications, the (privacy) concern of deniability arises: Can a protocol transcript be used—possibly by a participant—to prove the involvement of another party in the protocol? For two party key establishment protocols, a common technique for achieving deniability is the replacement of ...
Jens-Matthias Bohli, Rainer Steinwandt
openaire +1 more source
EDGAR: Extended Dynamic Group-Key AgReement
2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 2010Secure group communication has been an important research area for a couple of decades. There exists a myriad of algorithms and systems for establishing a group key securely. Nowadays researches focus on the high group dynamics because the mobile ad hoc network and the wireless sensor network are emerging environments; thereby devices have high ...
Jonguk Kim +3 more
openaire +1 more source
Group-Based Authentication and Key Agreement
Wireless Personal Communications, 2010This paper presents an authentication and key agreement protocol to streamline communication activities for a group of mobile stations (MSs) roaming from the same home network (HN) to a serving network (SN). In such a roaming scenario, conventional schemes require the SN to interact with the HN for authenticating respective MSs, at the cost of repeated
Yu-Wen Chen +3 more
openaire +1 more source

