Academic literature on the topic 'Logical Key Hierarchy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Logical Key Hierarchy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Logical Key Hierarchy"
Cho, Taenam, Sang-Ho Lee, and Won Kim. "A group key recovery mechanism based on logical key hierarchy." Journal of Computer Security 12, no. 5 (September 1, 2004): 711–36. http://dx.doi.org/10.3233/jcs-2004-12503.
Full textSun, Zhong Wei, Rong Gang Zhang, and Dan Liu. "Key Establishment Scheme for Distribution Automation System Using Logical Key Hierarchy Approach." Advanced Materials Research 383-390 (November 2011): 1246–49. http://dx.doi.org/10.4028/www.scientific.net/amr.383-390.1246.
Full textWang, Feng Ying, and Xiu Mei Li. "Research on Confidentiality about Provenance Based on Logical Key Hierarchy." Advanced Materials Research 219-220 (March 2011): 1664–69. http://dx.doi.org/10.4028/www.scientific.net/amr.219-220.1664.
Full textPatidar, Harshit Prakash, and Neetu Sharma. "Adaptive Approach of DSR and OLSR Routing Protocols Using Optimal Probabilistic Logical Key Hierarchy in MANET." Bonfring International Journal of Networking Technologies and Applications 03, no. 02 (June 30, 2016): 13–20. http://dx.doi.org/10.9756/bijnta.8131.
Full textMa, Yong Hong, Dan Dan Cui, and Xiu Yu Wang. "An Efficient Key Management Protocol for Multi-Microgrid Distribution System." Applied Mechanics and Materials 385-386 (August 2013): 1007–10. http://dx.doi.org/10.4028/www.scientific.net/amm.385-386.1007.
Full textKim, Hyun-Chul, Young-Gu Lee, Jung-Jae Kim, and Kwang-Hyung Lee. "Group Key Generation Scheme using Logical Operation of HashChain and Random Number in Hierarchy Structures." Journal of the Korea Academia-Industrial cooperation Society 11, no. 5 (May 31, 2010): 1693–701. http://dx.doi.org/10.5762/kais.2010.11.5.1693.
Full textDe Salve, Andrea, Roberto Di Pietro, Paolo Mori, and Laura Ricci. "A Logical Key Hierarchy Based Approach to Preserve Content Privacy in Decentralized Online Social Networks." IEEE Transactions on Dependable and Secure Computing 17, no. 1 (January 1, 2020): 2–21. http://dx.doi.org/10.1109/tdsc.2017.2729553.
Full textSAFAVI-NAINI, REIHANEH, HUAXIONG WANG, and DUNCAN S. WONG. "RESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES." International Journal of Foundations of Computer Science 17, no. 05 (October 2006): 1205–21. http://dx.doi.org/10.1142/s0129054106004340.
Full textGochar, Mahesh, Harshit Prakash, and Ravindar Singh. "Adaptive Approach for DSR and OLSR Routing Protocols using Optimal Probabilistic Logical Key Hierarchy in MANET." International Journal of Computer Applications 131, no. 18 (December 17, 2015): 36–42. http://dx.doi.org/10.5120/ijca2015907664.
Full textLi, Jie, Shaowen Yao, Jing Liu, and Yunyun Wu. "A Hierarchical Multicast Key Distribution Protocol." Electronics 10, no. 9 (April 22, 2021): 995. http://dx.doi.org/10.3390/electronics10090995.
Full textDissertations / Theses on the topic "Logical Key Hierarchy"
Hesselius, Tobias, and Tommy Savela. "A Java Framework for Broadcast Encryption Algorithms." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2504.
Full textBroadcast encryption is a fairly new area in cryptology. It was first addressed in 1992, and the research in this area has been large ever since. In short, broadcast encryption is used for efficient and secure broadcasting to an authorized group of users. This group can change dynamically, and in some cases only one-way communication between the sender and receivers is available. An example of this is digital TV transmissions via satellite, in which only the paying customers can decrypt and view the broadcast.
The purpose of this thesis is to develop a general Java framework for implementation and performance analysis of broadcast encryption algorithms. In addition to the actual framework a few of the most common broadcast encryption algorithms (Complete Subtree, Subset Difference, and the Logical Key Hierarchy scheme) have been implemented in the system.
This master’s thesis project was defined by and carried out at the Information Theory division at the Department of Electrical Engineering (ISY), Linköping Institute of Technology, during the first half of 2004.
Book chapters on the topic "Logical Key Hierarchy"
Inoue, Daisuke, and Masahiro Kuroda. "FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy." In Applied Cryptography and Network Security, 339–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24852-1_25.
Full textMihaljević, Miodrag J. "Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy." In Advances in Cryptology - ASIACRYPT 2003, 137–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-40061-5_9.
Full textPande, Aparna S., Yashwant V. Joshi, and Manisha Y. Joshi. "Enhanced Strict Binary Logical Key Hierarchy Algorithm for Secure Group Communication." In Advances in Intelligent Systems and Computing, 239–51. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-32-9515-5_23.
Full textPande, Aparna S., Yashwant Joshi, and Manisha Y. Joshi. "Analysis on Logical Key Hierarchy and Variants for Secure Group Communication." In Advances in Intelligent Systems and Computing, 419–30. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1513-8_44.
Full textPatidar, Harshit Prakash, and Neetu Sharma. "Adaptive Approach of AODV and DSDV Routing Protocols Using Optimal Probabilistic Logical Key Hierarchy in MANET." In Advances in Intelligent Systems and Computing, 715–31. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0135-2_69.
Full textPassingham, Richard E. "Prefrontal Cortex." In Understanding the Prefrontal Cortex, 287–330. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198844570.003.0008.
Full text"Urban and Community Fisheries Programs: Development, Management, and Evaluation." In Urban and Community Fisheries Programs: Development, Management, and Evaluation, edited by Karen K. Ballard. American Fisheries Society, 2008. http://dx.doi.org/10.47886/9781934874042.ch29.
Full textColeman, Billy. "Prologue." In Harnessing Harmony, 13–20. University of North Carolina Press, 2020. http://dx.doi.org/10.5149/northcarolina/9781469658872.003.0002.
Full textHurley, John S. "Quantifying Decision Making in the Critical Infrastructure via the Analytic Hierarchy Process (AHP)." In Cyber Warfare and Terrorism, 465–77. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch029.
Full textOliveira, Teresa Carla, Stuart Holland, João Fontes da Costa, and Francisco Edinaldo Lira de Carvalho. "Hierarchies and Holdings." In Advances in Human Resources Management and Organizational Development, 342–76. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4731-2.ch017.
Full textConference papers on the topic "Logical Key Hierarchy"
Pande, Aparna S., and Ravindra C. Thool. "Survey on Logical Key Hierarchy for secure group communication." In 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT). IEEE, 2016. http://dx.doi.org/10.1109/icacdot.2016.7877763.
Full textJun-Sik Lee, Ju-Hyung Son, Young-Hoon Park, and Seung-Woo Seo. "Optimal level-homogeneous tree structure for logical key hierarchy." In Middleware and Workshops (COMSWARE '08). IEEE, 2008. http://dx.doi.org/10.1109/comswa.2008.4554497.
Full textBodur, Huseyin, and Resul Kara. "Implementing Diffie-Hellman key exchange method on logical key hierarchy for secure broadcast transmission." In 2017 9th International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, 2017. http://dx.doi.org/10.1109/cicn.2017.8319374.
Full textDe Salve, Andrea, Roberto Di Pietro, Paolo Mori, and Laura Ricci. "Logical key hierarchy for groups management in Distributed Online Social Network." In 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE, 2016. http://dx.doi.org/10.1109/iscc.2016.7543820.
Full textDominici, Laura, and Pier Paolo Peruccio. "Systemic Education and Awareness: the role of project-based-learning in the systemic view." In Systems & Design: Beyond Processes and Thinking. Valencia: Universitat Politècnica València, 2016. http://dx.doi.org/10.4995/ifdp.2016.3712.
Full text