The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Symmetric key algorithms are a typically efficient and fast cryptosystem, so it has significant applications in many realms. For a wireless ad hoc network with constraint computational resources, the cryptosystem based on symmetric key algorithms is extremely suitable for such an agile and dynamic environment, along with other security strategies. In this paper, we introduce the concept of selective...
Though wireless networks provide great convenience to mobile users, they also give rise to non-trivial concerns about the security due to open channels and flexible mobility. An important concern is the securing of a communication link between any pair of nodes. Here, data encryption is deemed the primary solution to protect data confidentiality and integrity. However, the issue of traditional cryptographic...
Security plays an important role in today's information technology, particularly in wireless and mobile environments due to the lack of pre-deployed infrastructure and the unsuitability of centralized management. Since the encryption technique has been introduced to provide secure communications, it is critical to manage all kinds of keys efficiently when the network size is large or the topology...
Key management is an important service for providing secure communications when the network size is large or the topology is undergoing frequent changes. In most existing key management schemes, a centralized key certification authority is used; however, it is not suitable for wireless environments due to the networkspsila scalability and the insufficient computation ability of mobile nodes. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.