Articles with "group key" as a keyword



Photo from wikipedia

A group key agreement protocol for intelligent internet of things system

Sign Up to like & get
recommendations!
Published in 2021 at "International Journal of Intelligent Systems"

DOI: 10.1002/int.22644

Abstract: The application of intelligent computing in Internet of Things (IoTs) makes IoTs systems such as telemedicine, in‐vehicle IoT, and smart home more intelligent and efficient. Secure communication and secure resource sharing among intelligent terminals are… read more here.

Keywords: communication; group; intelligent terminals; security ... See more keywords
Photo by hudsoncrafted from unsplash

Group Key Authentication scheme for Vanet INtrusion detection (GKAVIN)

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Networks"

DOI: 10.1007/s11276-016-1197-z

Abstract: Security must be provided in VANET as it is open to various attacks due to malicious vehicle, Brute force attack, misbehaving and faulty nodes, malicious users, and malicious nodes. The attacks can be occurred due… read more here.

Keywords: key authentication; vanet; detection; group key ... See more keywords
Photo by papaioannou_kostas from unsplash

An Efficient Secure Group Communication in MANET Using Fuzzy Trust Based Clustering and Hierarchical Distributed Group Key Management

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-016-3366-x

Abstract: Secure group communication is desired in many group oriented applications of mobile ad hoc network (MANET), and fruitful communication achieved only via trustable network environment. In order to enhance the privacy among group members, proper… read more here.

Keywords: manet; communication; group; management ... See more keywords
Photo by papaioannou_kostas from unsplash

An Efficient Chaotic Maps-Based Deniable Authentication Group Key Agreement Protocol

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-4163-x

Abstract: Abstract More than two participants implement communication over the network at the same time, aiming to establish a common session key, and it is named group session communication. Nowadays, many researchers lay emphasis on achieve… read more here.

Keywords: key agreement; authentication; group; protocol ... See more keywords
Photo from wikipedia

Research on Self-Adaptive Group Key Management in Deep Space Networks

Sign Up to like & get
recommendations!
Published in 2020 at "Wireless Personal Communications"

DOI: 10.1007/s11277-020-07540-7

Abstract: Deep space network is a must-have technology to improve communication, navigation, and propulsion in future space missions, a very long physical distance among space entities is difficult to overcome efficiently as a space mission could… read more here.

Keywords: space; reliable end; decryption; end end ... See more keywords
Photo from wikipedia

Cross-cluster asymmetric group key agreement for wireless sensor networks

Sign Up to like & get
recommendations!
Published in 2017 at "Science China Information Sciences"

DOI: 10.1007/s11432-017-9212-2

Abstract: 1School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China; 2Research Center of Massive Language Information Processing and Cloud Computing Application, Beijing 100081, China; 3Institute of Computer and Communication Engineering, Zhengzhou University… read more here.

Keywords: cluster asymmetric; key agreement; cross cluster; agreement wireless ... See more keywords
Photo from wikipedia

Design and Implementation of Constant-Round Dynamic Group Key Exchange from RLWE

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2993296

Abstract: Group Key Exchange (GKE) is required for secure group communication with high confidentiality. In particular, a trusted authority can handle issues that happen by the malicious actions of group members, but it is expensive to… read more here.

Keywords: implementation; constant round; key exchange; group ... See more keywords
Photo from wikipedia

Provable Secure Group Key Establishment Scheme for Fog Computing

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3130471

Abstract: In the fog computing paradigms, fog nodes are closer to terminal devices and can extend services to the edge of the network, thereby reducing the impact of high latency and restricted networks in the Internet… read more here.

Keywords: group; scheme; group key; fog computing ... See more keywords
Photo from wikipedia

Dynamic Authenticated Asymmetric Group Key Agreement With Sender Non-Repudiation and Privacy for Group-Oriented Applications

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2021.3138445

Abstract: Group-oriented applications generally support communications for multiple entities (e.g., users and/or devices) through open networks. Typical requirements of group communications include secrecy, authentication, sender non-repudiation, and sender privacy. However, conventional approaches such as group key… read more here.

Keywords: sender non; non repudiation; group; group key ... See more keywords
Photo from wikipedia

Minimum Latency-Secure Key Transmission for Cloud-Based Internet of Vehicles Using Reinforcement Learning

Sign Up to like & get
recommendations!
Published in 2022 at "Computational Intelligence and Neuroscience"

DOI: 10.1155/2022/6296841

Abstract: The Internet of Vehicles (IoV) communication key management level controls the confidentiality and security of its data, which may withstand user identity-based attacks such as electronic spoofing. The IoV group's key is updated with a… read more here.

Keywords: reinforcement learning; group; management; group key ... See more keywords
Photo by papaioannou_kostas from unsplash

An authenticated hierarchical asymmetric group key agreement protocol based on identity

Sign Up to like & get
recommendations!
Published in 2019 at "International Journal of Embedded Systems"

DOI: 10.1504/ijes.2019.10025637

Abstract: Asymmetric group key agreement protocol is to negotiate a shared group encryption key. Each member can calculate a decryption key corresponding to the encryption key. With the rapid development of network and system technology, secure… read more here.

Keywords: key agreement; group; agreement protocol; group key ... See more keywords