The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Media sharing in cloud environment, which supports sharing media content at any time and from anywhere, is a promising paradigm of social interaction. However, it also brings forth security issues in terms of data confidentiality and access control on media data consumers with different access privileges. One promising solution is scalable media access control, which is capable of providing data confidentiality...
Decentralized node admission is an essential and fundamental security service in mobile ad hoc networks (MANETs). It is needed to securely cope with dynamic membership and topology as well as to bootstrap other important security primitives (such as key management) and services (such as secure routing) without the assistance of any centralized trusted authority. An ideal admission technique must involve...
Security issues in multi-privileged group communications containing multiple data streams are rather difficult to solve, as there are multiple access privileges among users. Traditional key management schemes use a key graph to manage all the keys in a group, which makes one key being shared by many users resulting in the "one-affect-many" problem. In a key-policy attribute-based encryption...
With the fast increases in the size of the scientific data, the visualization technique has been widely adopted to transform the information into an easy-to-understand representation. Since the security clearance and access rights of the end users may vary greatly in a scientic visualization system, the security mechanisms must be properly designed and deployed. In this paper, we present a key management...
Wireless Sensor Network (WSN) is a noticeable subject currently. There are many WSN applications including military control and environmental monitoring. In these applications, the security of data transmission is an important issue. Because sensor nodes are resource limited and they do not have fixed structure model, there needs an efficiently key distribution and management mechanisms to achieve...
Sensor networks are widely used in environment exploration and disaster recovery and in military applications due to their self-organization characteristics and distributed nature. As a fundamental requirement for providing security functionality in sensor networks, key management plays a central role in authentication and encryption. In this paper, we present a hexagon-based key predistribution scheme...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.