[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Parthasarathi et al., 2021 - Google Patents

Weighted ternary tree approach for secure group communication among mobile applications

Parthasarathi et al., 2021

Document ID
66798867802514573
Author
Parthasarathi P
Shankar S
Publication year
Publication venue
Wireless Personal Communications

External Links

Snippet

Recent trends and clustered technology in the IT industries create usage of various hand- held computing devices like mobile phones, digitizer, modem, tablets etc. The Mobile phones are pervasive and inevitable computing devices used for different purposes such as …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/06Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications

Similar Documents

Publication Publication Date Title
Liu et al. BC-SABE: Blockchain-aided searchable attribute-based encryption for cloud-IoT
Zhang et al. An efficient access control scheme with outsourcing capability and attribute update for fog computing
Huang et al. Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing
Parthasarathi et al. Weighted ternary tree approach for secure group communication among mobile applications
CN108989026B (en) Method for revoking user attribute in publishing/subscribing environment
Gao et al. BSSPD: A Blockchain‐Based Security Sharing Scheme for Personal Data with Fine‐Grained Access Control
Teng et al. A Modified Advanced Encryption Standard for Data Security.
Li et al. Privacy-preserving data utilization in hybrid clouds
Zhou et al. Privacy enhanced data outsourcing in the cloud
Tu et al. Reattack of a certificateless aggregate signature scheme with constant pairing computations
Meng et al. Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart city
Wang et al. Efficient incremental authentication for the updated data in fog computing
Kumar et al. An identity-based authentication framework for big data security
Zou et al. Highly secure privacy‐preserving outsourced k‐means clustering under multiple keys in cloud computing
Ma et al. A new private information encryption method in internet of things under cloud computing environment
Jiang et al. Online/offline ciphertext retrieval on resource constrained devices
Qin et al. An efficient key management scheme based on ECC and AVL tree for large scale wireless sensor networks
Wang et al. Attribute-based equality test over encrypted data without random oracles
Li et al. Secure and temporary access delegation with equality test for cloud-assisted IoV
Wang et al. Multi-message and multi-receiver heterogeneous signcryption scheme for ad-hoc networks
Naresh et al. A provably secure sharding based blockchain smart contract centric hierarchical group key agreement for large wireless ad‐hoc networks
Wei et al. Securing fine-grained data sharing and erasure in outsourced storage systems
Awais et al. A novel searchable encryption scheme to reduce the access pattern leakage
Yang et al. A group key agreement protocol based on ecdh and short signature
Wang et al. An efficient and provable secure revocable identity-based encryption scheme