Academic literature on the topic 'Logical Key Hierarchy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Logical Key Hierarchy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Logical Key Hierarchy"

1

Cho, Taenam, Sang-Ho Lee, and Won Kim. "A group key recovery mechanism based on logical key hierarchy." Journal of Computer Security 12, no. 5 (September 1, 2004): 711–36. http://dx.doi.org/10.3233/jcs-2004-12503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sun, Zhong Wei, Rong Gang Zhang, and Dan Liu. "Key Establishment Scheme for Distribution Automation System Using Logical Key Hierarchy Approach." Advanced Materials Research 383-390 (November 2011): 1246–49. http://dx.doi.org/10.4028/www.scientific.net/amr.383-390.1246.

Full text
Abstract:
Ethernet Passive Optical Networks (EPONs) are promising communication technologies for distribution automation system (DAS). However, EPONs have very specific security requirements, due to the broadcast character of the transmission medium. Based on the identity-based cryptography (IBC), and utilizing logical key hierarchy (LKH) approach, this paper presents an efficient key establishment scheme for distribution automation system using EPON. And the analysis results are also given in the paper.
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Feng Ying, and Xiu Mei Li. "Research on Confidentiality about Provenance Based on Logical Key Hierarchy." Advanced Materials Research 219-220 (March 2011): 1664–69. http://dx.doi.org/10.4028/www.scientific.net/amr.219-220.1664.

Full text
Abstract:
By analysing the security needs and the threat model of data provenance, a Key distribution algorithm based on Logical Key Hierarchy(LKH) is brought forward aiming at the confidentiality of provenance. In this paper, we make use of the LKH tree to reduce the storage of the keys for session encryption keys(SEK) of provenance records and decrease the transmission overhead of the provenance chains, which meet the requirement of compressing provenance chains, and then propose the method of dynamic expansion number of auditors that works out the problem of the auditors number dynamic changes existing in the safety requirements for confidentiality of provenance records.
APA, Harvard, Vancouver, ISO, and other styles
4

Patidar, Harshit Prakash, and Neetu Sharma. "Adaptive Approach of DSR and OLSR Routing Protocols Using Optimal Probabilistic Logical Key Hierarchy in MANET." Bonfring International Journal of Networking Technologies and Applications 03, no. 02 (June 30, 2016): 13–20. http://dx.doi.org/10.9756/bijnta.8131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ma, Yong Hong, Dan Dan Cui, and Xiu Yu Wang. "An Efficient Key Management Protocol for Multi-Microgrid Distribution System." Applied Mechanics and Materials 385-386 (August 2013): 1007–10. http://dx.doi.org/10.4028/www.scientific.net/amm.385-386.1007.

Full text
Abstract:
This paper studies network security of the multi-microgrid distribution system (MMDS) composing of a large number of distributed power-islands. First, a hierarchical communication model for MMDS is designed . Then we analyze the security vulnerabilities. Finally, proposes an efficient secure key management protocol by combining Iolus framework and logical key hierarchy (LKH).
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Hyun-Chul, Young-Gu Lee, Jung-Jae Kim, and Kwang-Hyung Lee. "Group Key Generation Scheme using Logical Operation of HashChain and Random Number in Hierarchy Structures." Journal of the Korea Academia-Industrial cooperation Society 11, no. 5 (May 31, 2010): 1693–701. http://dx.doi.org/10.5762/kais.2010.11.5.1693.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

De Salve, Andrea, Roberto Di Pietro, Paolo Mori, and Laura Ricci. "A Logical Key Hierarchy Based Approach to Preserve Content Privacy in Decentralized Online Social Networks." IEEE Transactions on Dependable and Secure Computing 17, no. 1 (January 1, 2020): 2–21. http://dx.doi.org/10.1109/tdsc.2017.2729553.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

SAFAVI-NAINI, REIHANEH, HUAXIONG WANG, and DUNCAN S. WONG. "RESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES." International Journal of Foundations of Computer Science 17, no. 05 (October 2006): 1205–21. http://dx.doi.org/10.1142/s0129054106004340.

Full text
Abstract:
Multicasting has become the main mode communication for providing a wide range of Internet services such as video broadcasting and multi-party teleconferencing, where data must be delivered to multiple recipients. The main focus of the work on securing multicast applications has been to control access and to ensure that only authorised users can access the broadcast. The authorised group is not fixed and may change over time and hence efficient methods of re-keying are of very important. Logical Key Hierarchy (LKH) schemes are schemes that use a logical tree to assign keys to users: each user will be attached to a leaf of the tree and will own all the keys allocated to the nodes from that leaf to the root of the tree. In this paper we propose a new LKH scheme in which only a subset of leaves are attached to users. This allows separation of the key sets of the users and providing protection against collusion attack. This property combined with the logarithmic size of the group controller storage makes the approach very attractive. We give a number of constructions, the best of which also has logarithmic cost for users' key storage and communication.
APA, Harvard, Vancouver, ISO, and other styles
9

Gochar, Mahesh, Harshit Prakash, and Ravindar Singh. "Adaptive Approach for DSR and OLSR Routing Protocols using Optimal Probabilistic Logical Key Hierarchy in MANET." International Journal of Computer Applications 131, no. 18 (December 17, 2015): 36–42. http://dx.doi.org/10.5120/ijca2015907664.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Jie, Shaowen Yao, Jing Liu, and Yunyun Wu. "A Hierarchical Multicast Key Distribution Protocol." Electronics 10, no. 9 (April 22, 2021): 995. http://dx.doi.org/10.3390/electronics10090995.

Full text
Abstract:
In secure group communication, group keys (GK) are used to ensure the confidentiality of communication. The group key distribution (GKD) is responsible for updating and distributing new group keys when the group membership changes. Most well-known GKD protocols are based on a logical key hierarchy (LKH), where only one group controller (GC) is used. These protocols have various issues, including a single point of failure, meaning that the GC often has a huge workload and can be easily overwhelmed. In this paper, we propose a hierarchical multicast key distribution protocol that supports multi-level controllers to manage a group. Each controller just needs to manage the next-level nodes, and if one fails, the superior controller can replace it with minimal work. The proposed protocol effectively balances the work of controllers, greatly improves the reliability of the group key distribution, and also allows group members to build dynamic conferences without controllers. We provide a security proof of the proposed protocol in a symbolic security model and compare it to other protocols in terms of efficiency, functionality, and security.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Logical Key Hierarchy"

1

Hesselius, Tobias, and Tommy Savela. "A Java Framework for Broadcast Encryption Algorithms." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2504.

Full text
Abstract:

Broadcast encryption is a fairly new area in cryptology. It was first addressed in 1992, and the research in this area has been large ever since. In short, broadcast encryption is used for efficient and secure broadcasting to an authorized group of users. This group can change dynamically, and in some cases only one-way communication between the sender and receivers is available. An example of this is digital TV transmissions via satellite, in which only the paying customers can decrypt and view the broadcast.

The purpose of this thesis is to develop a general Java framework for implementation and performance analysis of broadcast encryption algorithms. In addition to the actual framework a few of the most common broadcast encryption algorithms (Complete Subtree, Subset Difference, and the Logical Key Hierarchy scheme) have been implemented in the system.

This master’s thesis project was defined by and carried out at the Information Theory division at the Department of Electrical Engineering (ISY), Linköping Institute of Technology, during the first half of 2004.

APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Logical Key Hierarchy"

1

Inoue, Daisuke, and Masahiro Kuroda. "FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy." In Applied Cryptography and Network Security, 339–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24852-1_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mihaljević, Miodrag J. "Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy." In Advances in Cryptology - ASIACRYPT 2003, 137–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-40061-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pande, Aparna S., Yashwant V. Joshi, and Manisha Y. Joshi. "Enhanced Strict Binary Logical Key Hierarchy Algorithm for Secure Group Communication." In Advances in Intelligent Systems and Computing, 239–51. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-32-9515-5_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pande, Aparna S., Yashwant Joshi, and Manisha Y. Joshi. "Analysis on Logical Key Hierarchy and Variants for Secure Group Communication." In Advances in Intelligent Systems and Computing, 419–30. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1513-8_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Patidar, Harshit Prakash, and Neetu Sharma. "Adaptive Approach of AODV and DSDV Routing Protocols Using Optimal Probabilistic Logical Key Hierarchy in MANET." In Advances in Intelligent Systems and Computing, 715–31. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0135-2_69.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Passingham, Richard E. "Prefrontal Cortex." In Understanding the Prefrontal Cortex, 287–330. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198844570.003.0008.

Full text
Abstract:
The key to the granular prefrontal (PF) cortex is that it sits at the top of the sensory processing hierarchy, the motor hierarchy, and the outcome hierarchy. This means that it is a position to learn abstract task rules. These relate to conditional tasks that involve sequences, associations, and attentional performance. Because they can learn abstract rules, primates can show specific behavioural transfer from one problem to another when the problems share the same logic. And, since the different PF areas are closely interconnected, the PF cortex provides a general-purpose mechanism for the rapid solution of novel tasks.
APA, Harvard, Vancouver, ISO, and other styles
7

"Urban and Community Fisheries Programs: Development, Management, and Evaluation." In Urban and Community Fisheries Programs: Development, Management, and Evaluation, edited by Karen K. Ballard. American Fisheries Society, 2008. http://dx.doi.org/10.47886/9781934874042.ch29.

Full text
Abstract:
<em>Abstract.-</em>The capacity to conduct meaningful and cost-effective program evaluation is critical to program sustainability in this age of increasing accountability and competitive funding. Many urban fishing programs around the country have conducted basic process evaluation, accounting for audiences reached and numbers of activities. A comprehensive program evaluation requires clarity related to the ultimate goals and desired outcomes and ultimate impact of a program. Evaluation at this level can be challenging for programs with limited staff and resources. Meaningful evaluation of urban fishing programs can be guided by the development of a program logic mode. A logic model provides a representation of the “theory of action,” and has direct linkages to learning theory, specifically Bennett’s hierarchy of effects. A logic model supports a program director’s management of an evaluation by targeting evaluation efforts through the identification of key program outcome indicators that are specific, measurable, attainable, and results oriented.
APA, Harvard, Vancouver, ISO, and other styles
8

Coleman, Billy. "Prologue." In Harnessing Harmony, 13–20. University of North Carolina Press, 2020. http://dx.doi.org/10.5149/northcarolina/9781469658872.003.0002.

Full text
Abstract:
This prologue surveys the key political challenges, debates, and ideologies that animated American political life following the creation of the United States. It also gestures to the emerging political purposes of music within this context. It distinguishes Federalists from Republicans, explains their conflicting visions, and overviews the logic Federalists used to justify their desire for social control and their insistence on social order and hierarchy as preconditions for freedom and liberty. The prologue similarly outlines the social context of early American music, especially its connections to religion, morality, science, and European standards of excellence. Finally, it highlights music’s perceived capacity to help define the terms of a new, uniquely American national identity.
APA, Harvard, Vancouver, ISO, and other styles
9

Hurley, John S. "Quantifying Decision Making in the Critical Infrastructure via the Analytic Hierarchy Process (AHP)." In Cyber Warfare and Terrorism, 465–77. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch029.

Full text
Abstract:
In this paper, we examine the benefits of a more quantifiable way to make decisions that enable senior leaders to better manage disruption of and attacks on the critical infrastructure. Most of the decisions have been made using intuition and in some cases unrelated experiences and have not particularly worked to the benefit of the sectors' performance and stability. Much of this is due to the history of the logic control systems and networks that were fairly isolated and much better protected. Attempts to reduce costs and secure many of the benefits of IP-based environments have unfortunately now also introduced some of the vulnerabilities indicative of IP-based systems into the logic environments. Senior leaders have not been used to these new ‘hybrid' information technology/operational technology (IT/OT) environments which though creating new opportunities also introduce new challenges. The unique nature of the critical infrastructure in which it is over 80%-owned by the private sector, often regulated by the federal government, and serves the interests and demands of the public, creates a non-trivial challenge at many different levels. More trust and cooperation between the three elements of society is surely a desired interest by the key stakeholders, but there are many concerns in terms of over-regulation, costs, and loss of intellectual property that have consistently sustained a level of discomfort between the three communities in terms of the priorities and self-serving interests of each other. The challenges of the low asymmetry entry and attribution within the cyber domain have raised the profile of many actors who would not even have previously registered in the ‘noise' on a trouble or problem scale. Now, the ability to determine those responsible, as well as, almost any actor having the ability to present a challenge to the environment have changed many of the dynamics in terms of how senior leaders must now operate and manage the appropriate systems and networks. Hence, for obvious reasons, senior leaders are much more cautious in their approach to decision making because of the potential consequences. This is especially true because cyber assets, though so valuable can be also so vulnerable. In this study, we will discuss a method that moves decision from a less arbitrary to a more data-centric, quantifiable approach that drives leadership to better and quicker decisions.
APA, Harvard, Vancouver, ISO, and other styles
10

Oliveira, Teresa Carla, Stuart Holland, João Fontes da Costa, and Francisco Edinaldo Lira de Carvalho. "Hierarchies and Holdings." In Advances in Human Resources Management and Organizational Development, 342–76. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4731-2.ch017.

Full text
Abstract:
This chapter proposes that key features of New Public Management (NPM) in complex public service organisations, such as teaching hospitals, are less new than a reversal to Weberian hierarchy, Fordist concern with throughput rather than quality, Taylorist standardised performance criteria, and Foucauldian surveillance. While this judgement is severe, it illustrates that such management models combined with market or quasi-market criteria have been dysfunctional in the UK in near trebling administrative costs, demotivating health professionals, and in the view of their professional associations, risk destroying the principles of a national health service. It proposes that those concerned to counter this could draw on more plural modes of management in public sector institutions such as holding companies as a model for reforms in hospital organisation, which could enable a degree of relative autonomy for individual services and units similar to that typical of small- to medium-sized firms. It distinguishes organisational logic as the basis for economic efficiency from operational logic as the basis for social efficiency in terms of psychological wellbeing of both health professionals and patients. It submits that doctors as managers of staff in different services and units need relative autonomy for effective implementation of Human Resource Management (HRM) practices at operational levels to be able to enhance purposeful engagement and vocational commitment to health as public service as well to enable psychological contracting into change. Informed by a case study within a socio-cognitive approach in a major European teaching hospital, it then draws implications concerning the merits of a holding company model for hospital organisation.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Logical Key Hierarchy"

1

Pande, Aparna S., and Ravindra C. Thool. "Survey on Logical Key Hierarchy for secure group communication." In 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT). IEEE, 2016. http://dx.doi.org/10.1109/icacdot.2016.7877763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jun-Sik Lee, Ju-Hyung Son, Young-Hoon Park, and Seung-Woo Seo. "Optimal level-homogeneous tree structure for logical key hierarchy." In Middleware and Workshops (COMSWARE '08). IEEE, 2008. http://dx.doi.org/10.1109/comswa.2008.4554497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bodur, Huseyin, and Resul Kara. "Implementing Diffie-Hellman key exchange method on logical key hierarchy for secure broadcast transmission." In 2017 9th International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, 2017. http://dx.doi.org/10.1109/cicn.2017.8319374.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

De Salve, Andrea, Roberto Di Pietro, Paolo Mori, and Laura Ricci. "Logical key hierarchy for groups management in Distributed Online Social Network." In 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE, 2016. http://dx.doi.org/10.1109/iscc.2016.7543820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dominici, Laura, and Pier Paolo Peruccio. "Systemic Education and Awareness: the role of project-based-learning in the systemic view." In Systems & Design: Beyond Processes and Thinking. Valencia: Universitat Politècnica València, 2016. http://dx.doi.org/10.4995/ifdp.2016.3712.

Full text
Abstract:
Through the critical analysis of some case studies, this paper intends to investigate different tools useful to the ecological education,to analyse didactic activities which have more influence in the development of an individual and collective awareness and which of them can get closer students to the systemic approach. The systemic design is one of many actors that takes place inside a well-structured social network that presents always more frequently complex problems, which are difficult to solve by the application of linear approach. Always more it's clear that the way applied by the actual system to solve problems around not only ecological area, but also economic and cultural, it's not enough to answer to real needs. It's necessary a change of paradigm, from an approach based on the competition and on the logic of continuous growth, to a systemic vision, based on the collaboration, on the awareness and on the rediscovery of qualitative values. The ecological emergency demands more and more the development of sustainable and resilient communities; for this reason we have to change the way of thinking processes and relations, in other words we have to become ecoliterate: we have to be able to understand the organizational principles of ecosystems and the way of manage complexity. So ecoliteracy represent the starting point of innovative processes: it gives importance to the relations and to the multidisciplinary team-work. It's clear that next to the cultural change we have to rearrange the schooling system which now represents the official institution appointed of knowledge communication. The current academic system has been defined by the same linear and competitive approach used to delineate our economic systems, in this way, inside its structure, it usually reproduces the same social hierarchy and inequality that we can observe in our society. In practice, to achieve some important changes, it is necessary to extend precepts of systemic view to a huge group of people (starting from students of primary school to college students and over). Others two key points are the discussion around the strict hierarchy between teacher and student and the support of collaborative behaviour. Different experiences, academic and not, are compared, considering actors involved, activities, team-working and final outcome. For this reason the role of project-based-learning and practical academic activities is considered inside an education whose aim is to train people eco-competent and who are able to enhance their active role available to the community.DOI: http://dx.doi.org/10.4995/IFDP.2016.3712
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography