-
1Academic Journal
المؤلفون: Rei Ueno, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 1 (2023)
مصطلحات موضوعية: Fresh rekeying, Leakage resilience, Side-channel attack, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
2Academic Journal
المؤلفون: Juhyun Maeng, Yoonnyoung Heo, Inwhee Joe
المصدر: IEEE Access, Vol 10, Pp 56401-56409 (2022)
مصطلحات موضوعية: Group management, group key, rekeying, agent, hyperledger fabric, IoT device, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
3Academic Journal
المؤلفون: Ueno, Rei, Homma, Naofumi, Inoue, Akiko, Minematsu, Kazuhiko
المصدر: IACR Transactions on Cryptographic Hardware and Embedded Systems; Vol. 2024 No. 1; 264-308 ; 2569-2925
مصطلحات موضوعية: Fresh rekeying, Leakage resilience, Side-channel attack
وصف الملف: application/pdf
-
4Academic Journal
المؤلفون: Chunfu JIA, Guanxiong HA, Shaoqiang WU, Hang CHEN, Ruiqi LI
المصدر: Tongxin xuebao, Vol 42, Pp 67-80 (2021)
مصطلحات موضوعية: cloud storage, encrypted deduplication, rekeying, AONT, NTRU, Telecommunication, TK5101-6720
وصف الملف: electronic resource
Relation: https://doaj.org/toc/1000-436X
-
5Academic Journal
المؤلفون: Vinod Kumar, Rajendra Kumar, S.K. Pandey
المصدر: Journal of King Saud University: Computer and Information Sciences, Vol 32, Iss 9, Pp 1081-1094 (2020)
مصطلحات موضوعية: Key distribution, Multicast communication, Rekeying cost, Computation complexity, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
-
6Academic Journal
المؤلفون: Sudan Jha, Nishant Jha, Deepak Prashar, Sultan Ahmad, Bader Alouffi, Abdullah Alharbi
المصدر: Sensors; Volume 22; Issue 7; Pages: 2529
مصطلحات موضوعية: autonomous vehicles, blockchain, Ethereum, hashgraph, batch rekeying, logical key hierarchy
وصف الملف: application/pdf
Relation: Internet of Things; https://dx.doi.org/10.3390/s22072529
الاتاحة: https://doi.org/10.3390/s22072529
-
7Academic Journal
المؤلفون: Lakhlef, Hicham, Bouabdallah, Abdelmadjid
المساهمون: Heuristique et Diagnostic des Systèmes Complexes Compiègne (Heudiasyc), Université de Technologie de Compiègne (UTC)-Centre National de la Recherche Scientifique (CNRS), Laboratoire d'Excellence "Maîtrise des Systèmes de Systèmes Technologiques" (Labex MS2T)
المصدر: ISSN: 0045-7906 ; Computers and Electrical Engineering ; https://hal.science/hal-03509576 ; Computers and Electrical Engineering, 2021, 91, pp.107021. ⟨10.1016/j.compeleceng.2021.107021⟩.
مصطلحات موضوعية: Communicating things, Message-passing, Rekeying, Energy-efficiency, Security, Group communication, Memory complexity, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: hal-03509576; https://hal.science/hal-03509576; https://hal.science/hal-03509576/document; https://hal.science/hal-03509576/file/S0045790621000458.pdf; PII: S0045-7906(21)00045-8
-
8Academic Journal
المؤلفون: Muhammad Arif Mughal, Peng Shi, Ata Ullah, Khalid Mahmood, Muhammad Abid, Xiong Luo
المصدر: IEEE Access, Vol 7, Pp 76699-76711 (2019)
مصطلحات موضوعية: Internet of Things (IoT), multicasting, rekeying, wireless sensor networks (WSN), Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
9Dissertation/ Thesis
المؤلفون: Momin, Charles
المساهمون: UCL - SST/ICTM/ELEN - Pôle en ingénierie électrique, UCL - Ecole Polytechnique de Louvain, Standaert, François-Xavier, Guilley, Sylvain, Moradi, Amir, Peters, Thomas, Bol, David
مصطلحات موضوعية: Fresh-rekeying, Leveled implementation, Masking countermeasure, Side-channel attacks, Hardware implementation
Relation: boreal:285361; http://hdl.handle.net/2078.1/285361
الاتاحة: http://hdl.handle.net/2078.1/285361
-
10Academic Journal
المؤلفون: Ya-Cheng Li, Shin-Ming Cheng
المصدر: IEEE Access, Vol 6, Pp 61556-61568 (2018)
مصطلحات موضوعية: Anonymity, group signature, location privacy, mobile sensing, rekeying, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
11Academic Journal
المؤلفون: Uchiteleva, Elena
المصدر: Electronic Thesis and Dissertation Repository
مصطلحات موضوعية: IIoT, virtualization, WSN, dynamic rekeying, ML, concept drift, Electrical and Electronics, Systems and Communications
وصف الملف: application/pdf
Relation: https://ir.lib.uwo.ca/etd/7579; https://ir.lib.uwo.ca/context/etd/article/9933/viewcontent/EUthesisFinal.pdf
-
12Academic Journal
المساهمون: Laboratoire de Méthodes de Conception de Systèmes (LMCS), École Nationale Supérieure d'Informatique Alger (ESI), Centre de recherche sur l'Information Scientifique et Technique (CERIST), Ministère de l'Education nationale, de l’Enseignement supérieur et de la Recherche (M.E.N.E.S.R.), Heuristique et Diagnostic des Systèmes Complexes Compiègne (Heudiasyc), Université de Technologie de Compiègne (UTC)-Centre National de la Recherche Scientifique (CNRS), Center of Excellence in Information Assurance (CoEIA), King Saud University Riyadh (KSU)
المصدر: ISSN: 1389-1286 ; Computer Networks ; https://hal.science/hal-01703093 ; Computer Networks, 2018, 132, pp.161-179. ⟨10.1016/j.comnet.2018.01.010⟩.
مصطلحات موضوعية: Key Management Scheme, Individual rekeying, Smart Grid, Advanced Metering Infrastructure, Cyber Security, Batch rekeying, [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]
Relation: hal-01703093; https://hal.science/hal-01703093; https://hal.science/hal-01703093/document; https://hal.science/hal-01703093/file/VerSAMI-%20Computer%20Networks%20V.2.1.pdf
-
13Academic Journal
المؤلفون: Seetha R., Saravanan R.
المصدر: Cybernetics and Information Technologies, Vol 15, Iss 3, Pp 3-25 (2015)
مصطلحات موضوعية: group key, security, rekeying, multicast, key management, Cybernetics, Q300-390
وصف الملف: electronic resource
Relation: https://doaj.org/toc/1314-4081
-
14
المصدر: Journal of Science and Technology on Information security. 2:38-44
مصطلحات موضوعية: Rekeying, Theology, Mathematics
-
15Academic Journal
المؤلفون: Chin-Tser Huang, Manton Matthews, Matthew Ginley, Xinliang Zheng, Chuming Chen, J. Morris Chang
المصدر: Journal of Communications Software and Systems, Vol 3, Iss 3, Pp 199-206 (2007)
مصطلحات موضوعية: 802.16 WirelessMAN, Multicast, Privacy and Key Management (PKM) Protocol, Multicast and Broadcast Rekeying Algorithm (MBRA), Efficient sub-Linear rekeying Algorithm with Perfect Secrecy (ELAPSE), ELAPSE+, Computer software, QA76.75-76.765
وصف الملف: electronic resource
-
16
المؤلفون: J. N. Singh, Gunjan Srivastava, Manisha Manjul
المصدر: Journal of Discrete Mathematical Sciences and Cryptography. 24:787-795
مصطلحات موضوعية: Group key management, Algebra and Number Theory, business.industry, Computer science, Wireless network, Applied Mathematics, ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS, Power capacity, 010103 numerical & computational mathematics, 02 engineering and technology, 01 natural sciences, Application areas, 0202 electrical engineering, electronic engineering, information engineering, Rekeying, 020201 artificial intelligence & image processing, 0101 mathematics, business, Wireless sensor network, Analysis, Energy (signal processing), Computer network, Group key
-
17
المصدر: IEEE Open Journal of the Communications Society, Vol 2, Pp 87-101 (2021)
مصطلحات موضوعية: Record locking, business.industry, Computer science, quantum resistance, quantum-safe, Cryptography, security, Key management, Encryption, lcsh:HE1-9990, linear system of equations, lcsh:Telecommunication, key distribution, lcsh:TK5101-6720, Server, Scalability, Rekeying, Overhead (computing), lcsh:Transportation and communications, business, Computer network
-
18Conference
المؤلفون: Renugadevi, N., Mala, C.
المساهمون: National Institute of Technology Tiruchirappalli, Ismail Khalil, Erich Neuhold, A Min Tjoa, Li Da Xu, Ilsun You, TC 5, TC 8, WG 8.9
المصدر: Lecture Notes in Computer Science ; 3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS) ; https://hal.inria.fr/hal-01466215 ; 3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.161-172, ⟨10.1007/978-3-319-24315-3_16⟩
مصطلحات موضوعية: Distributed group, Ternary key tree, One way function, Batch rekeying, Cognitive radio networks, [INFO]Computer Science [cs], [SHS.INFO]Humanities and Social Sciences/Library and information sciences
جغرافية الموضوع: Daejon, South Korea
Relation: hal-01466215; https://hal.inria.fr/hal-01466215; https://hal.inria.fr/hal-01466215/document; https://hal.inria.fr/hal-01466215/file/978-3-319-24315-3_16_Chapter.pdf
-
19
المؤلفون: Santosh Pandey, Rajendra Kumar, Vinod Kumar
المصدر: Peer-to-Peer Networking and Applications. 14:82-100
مصطلحات موضوعية: Computer Networks and Communications, business.industry, Computer science, 020208 electrical & electronic engineering, Smart device, Key distribution, 020206 networking & telecommunications, 02 engineering and technology, law.invention, Smart grid, Home automation, law, 0202 electrical engineering, electronic engineering, information engineering, Rekeying, Session key, Unicast, business, Key management, Software, Computer network
-
20
المؤلفون: Sun Liyan, Zhou Jian, Wu Yue, Duan Kaiyu
المصدر: Wireless Personal Communications. 114:3435-3456
مصطلحات موضوعية: business.industry, Computer science, 020206 networking & telecommunications, 02 engineering and technology, NASA Deep Space Network, Adversary, Computer Science Applications, Public-key cryptography, Forward secrecy, Ciphertext, Container (abstract data type), 0202 electrical engineering, electronic engineering, information engineering, Rekeying, 020201 artificial intelligence & image processing, Electrical and Electronic Engineering, business, Computer network, Communication channel