The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Intermediate use ratio and intermediate input ratio were used to analyze the status of logistics industry in china. With the Prolong of 2005 Input-Output Table in China, input-output coefficients were used to study on the relationship among industrial sectors, including the direct input coefficient, the total input coefficient, the improved response coefficient and the improved influence coefficient...
Self-healing key distribution mechanism can be utilized for distributing session keys over an unreliable network. A self-healing key distribution scheme using bilinear pairings is proposed in this paper. As far as we know, it is the first pairing-based authenticated self-healing key distribution scheme. The scheme achieves a number of excellent properties. Firstly, the users can check the integrity...
Self-healing key distribution mechanism can be used to establish session keys within a large and dynamic groups of users over an unreliable network. Mutual-healing key distribution mechanism deals with some deficiency existed in self-healing key distribution mechanism. It is a complementarity to the self-healing mechanism. In this paper, a self-healing key distribution scheme using bilinear pairings...
Self-healing key distribution schemes enable a group user to recover session keys from two broadcast messages it received before and after those sessions, even if broadcast messages for middle sessions are lost due to network failure. These schemes are quite suitable for supporting secure communication over unreliable networks such as sensor networks and ad hoc networks. An efficient self-healing...
An efficient self-healing key distribution scheme with revocation capability is proposed for secure group communication in wireless networks. The scheme bases on vector space secret sharing and one way hash function techniques. Vector space secret sharing helps to realize general monotone decreasing structures for the family of subsets of users that can be revoked instead of a threshold one. One way...
Three-party key establishment protocol can help three participants to establish a shared secret key through interactions via public channels. In this paper, a novel three-party key agreement protocol is proposed. The protocol is based on non-commutative monoids in mathematics. It is a generic construction and one-time protocol per key establishment.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.