Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The trusted authorization scheme is core content of e-commerce. Authorization refers to a kind of mechanism that specific authenticated users can access secure resources. Authorization system relies on the authentication system to confirm the identity of legitimate users and prevent unauthorized users. In order to solve the trusted problem of authorization, TPM1.2 specification published by TCG organization...
The recommendation trust value is generally gotten by broadcasting request and collecting response from other nodes, so the results that returned by this method is uncertain and can't avoid being the malice recommendation. A new recommendation trust model is proposed in the paper basing on aggregate signature. The node trust values which include interactive node's signature are stored in local. When...
Wireless Ad hoc network is vulnerable to various security threats and key management is one important means to solve security problems of Ad hoc network. But the higher the security of key management mechanisms, the easier to consume more energy and network resources. An cross-layer key management model is proposed to resolve the questions due to the shortage of network resources and energy, both...
A password-authenticated key agreement scheme based on elliptic curves cryptography (ECC) for ad hoc networks is presented. The scheme is composed of system initialization, identity-based (ID-based) password evolvement algorithm, identity authentication algorithm and session keys generation algorithm. The freshness and security of password are guaranteed by the sharing password evolvement mechanism...
With initial trust in the system model, a new identity-based distributed key management scheme is proposed. Verifiable secret sharing technology and blind short signatures are applied into this scheme. The scheme is composed of system initialization, update of a node's private key, share refreshing of system private key, discover of malicious node and key revocation. The model with initial trust makes...
Group key agreement protocol is a effective solution to establish a common session key for communication in ad hoc network. But, due to frequent topology structure changes in ad hoc network, the member changing environment in group communication must be considered, besides establishing a common session key. Combined with complete binary tree architecture, this paper proposes a new identity-based group...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.